2009 Third International Conference on Network and System Security 2009
DOI: 10.1109/nss.2009.63
|View full text |Cite
|
Sign up to set email alerts
|

ACSIS: Agents for Cooperative Secured Information Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2012
2012

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…-Inheritance Access Links (IAL): these links allow a local role to inherit the rights of another. You can find a detailed paper on this subject at [8] where we describe all the SDO in a UML class diagram and the protocols to translate local policy using our canonical model.…”
Section: A Local Translation With Security Descriptive Objectsmentioning
confidence: 99%
See 1 more Smart Citation
“…-Inheritance Access Links (IAL): these links allow a local role to inherit the rights of another. You can find a detailed paper on this subject at [8] where we describe all the SDO in a UML class diagram and the protocols to translate local policy using our canonical model.…”
Section: A Local Translation With Security Descriptive Objectsmentioning
confidence: 99%
“…You can read more developments in [8]. The agent-based architecture uses a schema mediation-based [17] approach and allows secure access to, and manipulation of data, while complying with the autonomy of the local sources and providing transparent access for the users.…”
Section: Conclusion and Complementary Workmentioning
confidence: 99%