On practical specification and enforcement of obligations
Obligations are an important and indispensable part of many access control policies, such
as those in DRM (Digital Rights Management) and healthcare information systems. To be …
as those in DRM (Digital Rights Management) and healthcare information systems. To be …
PoCo: A Language for specifying obligation-based policy compositions
D Ferguson, Y Albright, D Lomsak, T Hanks… - Proceedings of the …, 2020 - dl.acm.org
Existing security-policy-specification languages allow users to specify obligations, but
challenges remain in the composition of complex obligations, including effective approaches …
challenges remain in the composition of complex obligations, including effective approaches …
Developing an ABAC-based grant proposal workflow management system
M Munakami - 2016 - scholarworks.boisestate.edu
In the advent of the digital transformation, online business processes need to be automated
and modeled as workflows. A workflow typically involves a sequence of coordinated tasks …
and modeled as workflows. A workflow typically involves a sequence of coordinated tasks …
Sicherheitsprobleme im Cloud Computing
S Groß, M Lischka, N Gruschka, A Miede… - PIK-Praxis der …, 2011 - degruyter.com
Mittels Cloud Computing können Infrastruktur-, Plattformund Software-Dienste auf Anfrage
dynamisch bereitgestellt und nutzungsabhängig abgerechnet werden. Diese Art der …
dynamisch bereitgestellt und nutzungsabhängig abgerechnet werden. Diese Art der …
[图书][B] Composition of Atomic-Obligation Security Policies
D Ferguson - 2020 - search.proquest.com
There has been significant work to date on policy-specification languages that allow
specification of arbitrary obligations, but there continues to exist open challenges in the …
specification of arbitrary obligations, but there continues to exist open challenges in the …
Improving the Policy Specification for Practical Access Control Systems
H Chen - 2017 - search.proquest.com
Access control systems play a crucial role in protecting the security of information systems by
ensuring that only authorized users are granted access to sensitive resources, and the …
ensuring that only authorized users are granted access to sensitive resources, and the …
BALANCING NON-FUNCTIONAL REQUIREMENTS IN CLOUD-BASED SOFTWARE: AN APPROACH BASED ON SECURITY-AWARE DESIGN AND MULTI …
D El Kateb - 2015 - orbilu.uni.lu
Beyond its functional requirements, architectural design, the quality of a software system is
also defined by the degree to which it meets its non-functional requirements. The complexity …
also defined by the degree to which it meets its non-functional requirements. The complexity …
[PDF][PDF] DOCTEUR DE L'UNIVERSITÉ DU LUXEMBOURG
D EL KATEB - 1981 - core.ac.uk
Beyond its functional requirements, architectural design, the quality of a software system is
also defined by the degree to which it meets its non-functional requirements. The complexity …
also defined by the degree to which it meets its non-functional requirements. The complexity …