Empreu aquest identificador per citar o enllaçar aquest ítem: http://hdl.handle.net/10609/109815
Registre complet de metadades
Camp DCValorLlengua/Idioma
dc.contributor.authorPreda, Stere-
dc.contributor.authorCuppens, Frederic-
dc.contributor.authorCuppens, Nora-
dc.contributor.authorGarcia-Alfaro, Joaquin-
dc.contributor.authorToutain, Laurent-
dc.contributor.otherUniversitat Oberta de Catalunya (UOC)-
dc.contributor.otherInstitut Mines-Télécom-
dc.date.accessioned2020-02-18T08:23:52Z-
dc.date.available2020-02-18T08:23:52Z-
dc.date.issued2009-08-24-
dc.identifier.citationPreda, S., Cuppens, F., Cuppens, N., García Alfaro, J. & Toutain, L. (2011). Dynamic deployment of context-aware access control policies for constrained security devices. Journal of Systems and Software, 84(7), 1144-1159. doi: 10.1016/j.jss.2011.02.005es
dc.identifier.issn0164-1212MIAR
-
dc.identifier.urihttp://hdl.handle.net/10609/109815-
dc.description.abstractSecuring the access to a server, guaranteeing a certain level of protection over an encrypted communication channel, executing particular counter measures when attacks are detected are examples of security requirements. Such requirements are identi ed based on organizational purposes and expectations in terms of resource access and availability and also on system vulnerabilities and threats. All these requirements belong to the so-called security policy. Deploying the policy means enforcing, i.e., con guring, those security components and mechanisms so that the system behavior be nally the one speci ed by the policy. The deployment issue becomes more di cult as the growing organizational requirements and expectations generally leave behind the integration of new security functionalities in the information system: the information system will not always embed the necessary security functionalities for the proper deployment of contextual security requirements. To overcome this issue, our solution is based on a central entity approach which takes in charge unmanaged contextual requirements and dynamically redeploys the policy when context changes are detected by this central entity. We also present an improvement over the OrBAC (Organization-Based Access Control) model. Up to now, a controller based on a contextual OrBAC policy is passive, in the sense that it assumes policy evaluation triggered by access requests. Therefore, it does not allow reasoning about policy state evolution when actions occur. The modi cations introduced by our work overcome this limitation and provide a proactive version of the model by integrating concepts from action speci cation languages.en
dc.format.mimetypeapplication/pdf-
dc.language.isoeng-
dc.publisherJournal of Systems and Software-
dc.relation.ispartofJournal of Systems and Software, 2011, 84(7)-
dc.relation.urihttps://doi.org/10.1016/j.jss.2011.02.005-
dc.rightsCC BY-NC-ND-
dc.rights.urihttps://creativecommons.org/licenses/by-nc-nd/3.0/es/-
dc.subjectIT securityen
dc.subjectnetwork securityen
dc.subjectauthorizationen
dc.subjectOrBACen
dc.subjectseguretat informàticaca
dc.subjectseguridad informáticaes
dc.subjectseguretat de xarxesca
dc.subjectseguridad de redeses
dc.subjectautoritzacióca
dc.subjectautorizaciónes
dc.subjectOrBACca
dc.subjectOrBACes
dc.subject.lcshComputer securityen
dc.titleDynamic deployment of context-aware access control policies for constrained security devices-
dc.typeinfo:eu-repo/semantics/article-
dc.subject.lemacSeguretat informàticaca
dc.subject.lcshesSeguridad informáticaes
dc.rights.accessRightsinfo:eu-repo/semantics/openAccess-
dc.identifier.doi10.1016/j.jss.2011.02.005-
dc.gir.idAR/0000002455-
dc.relation.projectIDinfo:eu-repo/grantAgreement/ANR-08-SEGI-018-
dc.relation.projectIDinfo:eu-repo/grantAgreement/TSI2007-65406-C03-03 E-AEGIS-
dc.relation.projectIDinfo:eu-repo/grantAgreement/CONSOLIDER INGENIO 2010 CSD2007-0004 ARES-
dc.relation.projectIDinfo:eu-repo/grantAgreement/ICT FP7-257315-
dc.type.versioninfo:eu-repo/semantics/submittedVersion-
Apareix a les col·leccions:Articles cientÍfics
Articles

Arxius per aquest ítem:
Arxiu Descripció MidaFormat 
Garcia_Dynamic_JSS_pre.pdfPre-print1,09 MBAdobe PDFThumbnail
Veure/Obrir
Comparteix:
Exporta:
Consulta les estadístiques

Aquest ítem està subjecte a una llicència de Creative Commons Llicència Creative Commons Creative Commons