The new generation of networking environments such as the internet of things (IoT), cloud computing, etc. is emerging and releases new prospects to traditional information systems …
AV Uzunov, EB Fernandez, K Falkner - Computers & Security, 2015 - Elsevier
The design of an authorization infrastructure is one of the most important aspects of engineering a secure software system. Unlike other system types, distributed systems–and …
Access control (AC) policies are a set of rules administering decisions in systems and they are increasingly used for implementing flexible and adaptive systems to control access in …
This paper presents administration subsystem that was developed to enable dynamic customization of enterprise applications specified by our Kroki tool. Kroki is a tool for …
Security is a critical concern for any information system. Security properties such as confidentiality, integrity and availability need to be enforced in order to make systems safe …
Security is a critical concern for any information system. Security properties such as confidentiality, integrity and availability need to be enforced in order to make systems safe …
Die Digitalisierung der Industrie 4.0 führt zu einer enormen Erzeugung an Daten. Um mit der Datenmenge zurechtzukommen, werden diese oft in die Cloud ausgelagert. Auch Zulieferer …