Role-Based Access Control Models
Computer
TRBAC: A temporal role-based access control model
ACM Transactions on Information and System Security (TISSEC)
Formal Characterizations of Active Databases: Part II
DOOD '97 Proceedings of the 5th International Conference on Deductive and Object-Oriented Databases
A Context-Sensitive Access Control Model and Prototype Implementation
Proceedings of the IFIP TC11 Fifteenth Annual Working Conference on Information Security for Global Information Infrastructures
Formal Characterization of Active Databases
LID '96 Proceedings of the International Workshop on Logic in Databases
On context in authorization policy
Proceedings of the eighth ACM symposium on Access control models and technologies
Organization based access control
POLICY '03 Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
A Mobile-Agent based Distributed Dynamic µFirewall Architecture
ICPADS '02 Proceedings of the 9th International Conference on Parallel and Distributed Systems
Micro-Firewalls for Dynamic Network Security with Distributed Intrusion Detection
NCA '01 Proceedings of the IEEE International Symposium on Network Computing and Applications (NCA'01)
GEO-RBAC: a spatially aware RBAC
Proceedings of the tenth ACM symposium on Access control models and technologies
SAINT-W '05 Proceedings of the 2005 Symposium on Applications and the Internet Workshops
Substituting COPS-PR: An Evaluation of NETCONF and SOAP for Policy Provisioning
POLICY '06 Proceedings of the Seventh IEEE International Workshop on Policies for Distributed Systems and Networks
Policy-Based Network Management: Solutions for the Next Generation (The Morgan Kaufmann Series in Networking)
Complete analysis of configuration rules to guarantee reliable network security policies
International Journal of Information Security
Modeling contextual security policies
International Journal of Information Security
Using contextual security policies for threat response
DIMVA'06 Proceedings of the Third international conference on Detection of Intrusions and Malware & Vulnerability Assessment
Analysis of policy anomalies on distributed network security setups
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
MIRAGE: a management tool for the analysis and deployment of network security policies
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
Dynamic deployment of context-aware access control policies for constrained security devices
Journal of Systems and Software
Context-aware device self-configuration using self-organizing maps
Proceedings of the 2011 workshop on Organic computing
Model-Driven security policy deployment: property oriented approach
ESSoS'10 Proceedings of the Second international conference on Engineering Secure Software and Systems
Hi-index | 0.00 |
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the security devices. The complexity of the security requirements is additionally increased when contextual constraints are taken into account. Such situations appear when addressing the dynamism of some security requirements or when searching a finer granularity for the security rules. The context denotes those specific conditions in which the security requirements are to be met. (Re)deploying a contextual security policy depends on the security device functionalities: either (1) the devices include all functionalities necessary to deal with a context and the policy is consequently deployed for ensuring its automatic changes or (2) the devices do not have the right functionalities to entirely interpret a contextual requirement. We present a solution to cope with this issue: the (re)deployment of access control policies in a system that lacks the necessary functionalities to deal with contexts.