2014 6th International Conference on New Technologies, Mobility and Security (NTMS) 2014
DOI: 10.1109/ntms.2014.6814050
|View full text |Cite
|
Sign up to set email alerts
|

Specification and Enforcement of Dynamic Authorization Policies Oriented by Situations

Abstract: Nowadays, accessing communication networks and systems faces multitude applications with large-scale requirements dimensions. Mobility -roaming services in particular-during urgent situations exacerbate the access control issues. Dynamic authorization then is required. However, traditional access control fails to ensure policies to be dynamic. Instead, we propose to externalize the dynamic behavior management of networks and systems through situations. Situations modularize the policy into groups of rules and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2015
2015
2025
2025

Publication Types

Select...
4
2
1

Relationship

3
4

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 9 publications
0
9
0
Order By: Relevance
“…We developed a situation-awareness approach [12,13,14] to deal with such complex security management issues. In this section, we specify this use case scenario as a security situationbased model.…”
Section: Expressing Situations Using Complex Eventsmentioning
confidence: 99%
“…We developed a situation-awareness approach [12,13,14] to deal with such complex security management issues. In this section, we specify this use case scenario as a security situationbased model.…”
Section: Expressing Situations Using Complex Eventsmentioning
confidence: 99%
“…To translate this statement in EPL, we specify event startFar in two steps (Figure 8). First, we compute two complex events: i ) MayBeFarEvent meaning either the smartphone (lines 4-5) or the computer (lines 6-7) of the same owner (line 11) moves to another room (line 12) while the current situation is close (lines [13][14][15][16][17], and ii ) MayBeCloseEvent when the smartphone (lines [22][23] or the computer (lines 24-25) moves to a room such that both devices are then in the same room (line 30) and while the current situation is far (lines 31-35). These complex events will be re-injected within the CEP system to compute the beginning of situation far by when an event MayBeFarEvent has been triggered…”
Section: Dynamic Security Based On Indoor Locationmentioning
confidence: 99%
“…However, their approach focuses mainly on the purpose of access only. Finally, we presented a preliminary work in [23] that advocates the necessity of a situation manager and we implemented the Break-the-Glass mechanism [24]. However, our work was limited to the outsourcing deployment mode only.…”
Section: Related Workmentioning
confidence: 99%
“…Dynamic Rule Evaluation. Few researchers have started looking at dynamic policy rule evaluation as opposed to static policies [8], [18]. Among the relatively few researchers who took dynamicity of a context to a higher level by considering dynamicity of a rule is Pallapa et al [30].…”
Section: Related Workmentioning
confidence: 99%