2nd IEEE International Conference on Industrial Informatics, 2004. INDIN '04. 2004
DOI: 10.1109/indin.2004.1417387
|View full text |Cite
|
Sign up to set email alerts
|

Security service adaptation for embedded service systems in changing environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0
1

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 9 publications
0
5
0
1
Order By: Relevance
“…This can be accomplished by adding features of RBAC extensions such as the UCONABC usage control model 53 and Generalized‐RBAC (GRBAC) 54. An example of this research direction in another context is given by the SIRENA project 55, 56.…”
Section: Discussionmentioning
confidence: 99%
“…This can be accomplished by adding features of RBAC extensions such as the UCONABC usage control model 53 and Generalized‐RBAC (GRBAC) 54. An example of this research direction in another context is given by the SIRENA project 55, 56.…”
Section: Discussionmentioning
confidence: 99%
“…Several aspects of that work have already been published. In particular, [Ill04] reports on the automated adaptation of security service configurations to changing environment conditions. [Ilp05] expands the scope to general technical management and presents the overall context of modeling, tool and distributed management systems.…”
Section: Introductionmentioning
confidence: 99%
“…Besides using the above outlined approach for the modeling of common management policies we also apply it for modeling security policies as we already presented in [8] and [9]. Either, a meta-model contains transformation methods which describe the relevant graph structures to look for and the alteration function which should be applied to the graph in case that such a structure is found.…”
Section: Management Model Elementsmentioning
confidence: 99%