Usage control in computer security: A survey

A Lazouski, F Martinelli, P Mori - Computer Science Review, 2010 - Elsevier
Protecting access to digital resources is one of the fundamental problems recognized in
computer security. As yet it remains a challenging problem to work out, starting from the …

A survey of trust in workflows and relevant contexts

W Viriyasitavat, A Martin - IEEE Communications Surveys & …, 2011 - ieeexplore.ieee.org
With the fast-growing Internet technology, several service-based interactions are prevalent
and appear in several forms such as e-commerce, content provider, Virtual Organizations …

[HTML][HTML] A domain-specific language for the specification of UCON policies

AMR Quintero, SM Pérez, ÁJ Varela-Vaca… - Journal of information …, 2022 - Elsevier
Security policies constrain the behavior of all users of an information system. In any non-
trivial system, these security policies go beyond simple access control rules and must cover …

Cloud service negotiation framework for real-time E-commerce application using game theory decision system

R Rajavel, SK Ravichandran… - Journal of Intelligent …, 2021 - content.iospress.com
A major demanding issue is developing a Service Level Agreement (SLA) based negotiation
framework in the cloud. To provide personalized service access to consumers, a novel …

Extending Security-by-Contract with quantitative trust on mobile devices

G Costa, N Dragoni, A Lazouski… - 2010 International …, 2010 - ieeexplore.ieee.org
Security-by-Contract (S× C) is a paradigm providing security assurances for mobile
applications. In this work, we present an extension of S× C enriched with an automatic trust …

Implementation of an Advanced Authentication Method within Microsoft Active Directory Network Services

J Kadlec, D Jaros, R Kuchta - 2010 6th International …, 2010 - ieeexplore.ieee.org
This paper describes a new approach for developing and implementing an advanced
authentication method within active directory network services. For advance authentication …

A trust negotiation based security framework for service provisioning in load-balancing clusters

A Maña, H Koshutanski, EJ Pérez - computers & security, 2012 - Elsevier
The OKKAM project aims at enabling the Web of Entities, a global digital space for
publishing and managing information about entities. The project provides a scalable and …

Security-by-Contract-with-Trust for mobile devices

G Costa, A Lazouski, F Martinelli… - Journal of Wireless …, 2010 - inria.hal.science
Security-by-Contract (S× C) is a paradigm providing security assurances for mobile
applications. In this work, we present the an extension of S× C, called Security-by-Contract …

Applying Design Patterns in URI Strategies--Naming in Linked Geospatial Data Infrastructure

S Abbas, A Ojo - 2014 47th Hawaii International Conference …, 2014 - ieeexplore.ieee.org
The centrality of Uniform Resource Identifiers (URI) as names in Linked Data initiatives has
led to the development of guidelines and best practices by World Wide Web Consortium …

[PDF][PDF] A survey of usage control in computer security

A Lazouski, F Martinelli, P Mori - Istituto di Informática e Telemática, CNR, 2008 - Citeseer
Protecting access to digital resources is one of the fundamental problems recognized in
computer security. It yet remains a challenging problem to work out starting from the …