A review of access control metamodels

N Kashmar, M Adda, M Atieh, H Ibrahim - Procedia Computer Science, 2021 - Elsevier
The emergence of ubiquitous computing, especially with the Internet of Things (IoT),
releases new prospects to traditional information systems by merging new technologies and …

[PDF][PDF] Access Control Metamodels: Review, Critical Analysis, and Research Issues.

N Kashmar, M Adda, H Ibrahim - J. Ubiquitous Syst. Pervasive Networks, 2022 - iasks.org
The new generation of networking environments such as the internet of things (IoT), cloud
computing, etc. is emerging and releases new prospects to traditional information systems …

Security solution frames and security patterns for authorization in distributed, collaborative systems

AV Uzunov, EB Fernandez, K Falkner - Computers & Security, 2015 - Elsevier
The design of an authorization infrastructure is one of the most important aspects of
engineering a secure software system. Unlike other system types, distributed systems–and …

HEAD Access Control Metamodel: Distinct Design, Advanced Features, and New Opportunities

N Kashmar, M Adda, H Ibrahim - Journal of Cybersecurity and Privacy, 2022 - mdpi.com
Access control (AC) policies are a set of rules administering decisions in systems and they
are increasingly used for implementing flexible and adaptive systems to control access in …

[PDF][PDF] Kroki Administration Subsystem Based on RBAC Standard and Aspects

S Kaplar, M Filipović, G Milosavljević… - … on Information Society …, 2015 - kroki-mde.net
This paper presents administration subsystem that was developed to enable dynamic
customization of enterprise applications specified by our Kroki tool. Kroki is a tool for …

Model-driven integration and analysis of access-control policies in multi-layer information systems

S Martínez, J Garcia-Alfaro, F Cuppens… - ICT Systems Security …, 2015 - Springer
Security is a critical concern for any information system. Security properties such as
confidentiality, integrity and availability need to be enforced in order to make systems safe …

Automatic reconstruction and analysis of security policies from deployed security components

S Martínez - 2014 - theses.hal.science
Security is a critical concern for any information system. Security properties such as
confidentiality, integrity and availability need to be enforced in order to make systems safe …

Framework für einen zusammengesetzten Datenspeicher

R Bitz - 2019 - elib.uni-stuttgart.de
Die Digitalisierung der Industrie 4.0 führt zu einer enormen Erzeugung an Daten. Um mit der
Datenmenge zurechtzukommen, werden diese oft in die Cloud ausgelagert. Auch Zulieferer …