Integrity-OrBAC: a new model to preserve Critical Infrastructures integrity
暂无分享,去创建一个
Ryma Abassi | Anas Abou El Kalam | Abdellah Ait Ouahman | Adel Bouhoula | Abdeljebar Ameziane El Hassani | A. A. E. Kalam | A. A. Ouahman | A. Bouhoula | Ryma Abassi | A. A. E. Hassani
[1] Jaehong Park,et al. Usage Control: A Vision for Next Generation Access Control , 2003, MMM-ACNS.
[2] Nora Cuppens-Boulahia,et al. O2O: Virtual Private Organizations to Manage Security Policy Interoperability , 2006, ICISS.
[3] Miguel Correia,et al. The Crutial Way of Critical Infrastructure Protection , 2008, IEEE Security & Privacy Magazine.
[4] John D. Moteff,et al. Critical Infrastructure and Key Assets: Definition and Identification , 2004 .
[5] David D. Clark,et al. A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.
[6] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[7] Nora Cuppens-Boulahia,et al. High Level Conflict Management Strategies in Advanced Access Control Models , 2007, ICS@SYNASC.
[8] Frédéric Cuppens,et al. Organization based access control , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.
[9] Anas Abou El Kalam,et al. PolyOrBAC: A security framework for Critical Infrastructures , 2009, Int. J. Crit. Infrastructure Prot..
[10] Frédéric Cuppens,et al. Administration Model for Or-BAC , 2003, OTM Workshops.
[11] Guixiong Liu,et al. Configuring Clark-Wilson Integrity Model to Enforce Flexible Protection , 2009, 2009 International Conference on Computational Intelligence and Security.
[12] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[13] K. J. Bma. Integrity considerations for secure computer systems , 1977 .
[14] Frédéric Cuppens,et al. Modelling contexts in the Or-BAC model , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[15] Massoud Amin. North America's Electricity Infrastructure: Are We Ready for More Perfect Storms? , 2003, IEEE Secur. Priv..
[16] Frédéric Cuppens,et al. A stratification-based approach for handling conflicts in access control , 2003, SACMAT '03.
[17] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[18] Roshan K. Thomas,et al. Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments , 1997, RBAC '97.
[19] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[20] Yves Deswarte,et al. Supporting multiple levels of criticality , 1998, Digest of Papers. Twenty-Eighth Annual International Symposium on Fault-Tolerant Computing (Cat. No.98CB36224).
[21] Miguel Correia,et al. The CRUTIAL Architecture for Critical Information Infrastructures , 2008, WADS.
[22] Matt Bishop,et al. Computer Security: Art and Science , 2002 .
[23] Harold F. Tipton,et al. Handbook of Information Security Management , 1997 .
[24] Ravi S. Sandhu,et al. Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management , 1997, DBSec.
[25] Anas Abou El Kalam,et al. Control Policy : A Framework to Enforce Recommendations , 2011 .
[26] Michael J. Nash,et al. The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[27] Michael Merritt,et al. Composing system integrity using I/O automata , 1994, Tenth Annual Computer Security Applications Conference.
[28] F. Cuppens,et al. Inheritance hierarchies in the Or-BAC model and application in a network environment , 2022 .
[29] Mark Anderson,et al. A Context-Based Integrity Framework , 2012, 2012 19th Asia-Pacific Software Engineering Conference.
[30] Christopher Anglim,et al. USA Patriot Act : a legislative history of the Uniting and Strengthening of America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act, Public Law no. 107-56 (2001) , 2002 .
[31] Anas Abou El Kalam,et al. Integrity-Organization Based Access Control for Critical Infrastructure Systems , 2012, Critical Infrastructure Protection.
[32] A. Ait Ouahman,et al. Integrity-OrBAC: An OrBAC enhancement that takes into account integrity , 2013, 2013 8th International Conference on Intelligent Systems: Theories and Applications (SITA).
[33] Torsten Fink,et al. Specification and Enforcement of Access Control in Heterogeneous Distributed Applications , 2003, ICWS-Europe.
[34] Benedict G. E. Wiedemann. Protection? , 1998, Science.