Security requirements deal with the protection of assets against unauthorized access (disclosure or modification) and their availability to authorized users. Temporal constraints of …
In the era of service-oriented computing, ICT systems exponentially grow in their size and complexity, becoming more and more dynamic and distributed, often spanning across …
A Cau, B Moszkowski, H Zedan - URL: http://www. cms. dmu. ac …, 2006 - antonio-cau.co.uk
Abstract Interval Temporal Logic (ITL) is a flexible notation for both propositional and first- order reasoning about periods of time found in descriptions of hardware and software …
Access control mechanisms protect critical resources of systems from unauthorized access. In a policy-based management approach, administrators define user privileges as rules that …
Policy-based approaches to the management of systems distinguish between the specification of requirements, in the form of policies, and their enforcement on the system. In …
H Zedan, S Al-Sultan - Expert Systems with Applications, 2017 - Elsevier
There are two major concerns in the development of current workflow system. The first is security considerations and the second is context awareness. Modern workflow systems …
S Reiff-Marganiec, M Tilly… - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
The Internet of Things, large scale sensor networks or even in social media, are now well established and their use is growing daily. Usage scenarios in these fields highlight the …
This paper reasons on usage control in Data Grids. We adapt the UCON abc usage control framework for the case of distributed systems with multiple authoritative points. We call it the …
We propose a novel approach for the collaborative enforcement of security policies in distributed systems that is based on the dynamic (re-) deployment of multiple PDPs. The …