2011
DOI: 10.1016/j.jss.2011.02.005
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic deployment of context-aware access control policies for constrained security devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0
1

Year Published

2012
2012
2016
2016

Publication Types

Select...
5
3

Relationship

4
4

Authors

Journals

citations
Cited by 23 publications
(11 citation statements)
references
References 26 publications
0
10
0
1
Order By: Relevance
“…The organization-based access control approaches have been designed to allow access control management policies to be applied in a multi-organizational setting (e.g., [46][47][48]). …”
Section: Organization-based Access Controlmentioning
confidence: 99%
“…The organization-based access control approaches have been designed to allow access control management policies to be applied in a multi-organizational setting (e.g., [46][47][48]). …”
Section: Organization-based Access Controlmentioning
confidence: 99%
“…A prominent approach in this area constitutes the Temporal Semantic Based Access Control (TSBAC) model [33], which enhances the specification of user-defined authorisation rules by constraining time interval and temporal expressions over users' history of accesses, which are stored in a History Base. OrBAC [2][9] [31] is rather the most mature approach in this area; it is the first to express all different types of context within a unique homogeneous framework. In particular, OrBAC defines a Context Ontology comprised not only of temporal, spatial, and historical context but also of user-declared and application dependent context; the latter depends on the characteristics that join the subject, the action and the object and can be evaluated by querying the system database, whereas user-declared context allows for modelling contexts that are difficult to be described using environmental conditions.…”
Section: Related Workmentioning
confidence: 99%
“…Refinement approaches may also take into account the functionality offered by every firewall manufacturer (stateless, stateful, management of 11 virtual private networking, etc.) [31] to ensure the effective distribution of tasks between a decision module and the eventual filtering (enforcement) components. For the already deployed firewall configurations, the aforementioned approaches do not solve redundancy or configuration conflicts that might have been introduced due to periodic, often manual, updates.…”
Section: Related Workmentioning
confidence: 99%