-
1
-
-
0035696915
-
Identifying, understanding, and analyzing critical infrastructure interdependencies
-
Rinaldi S.M., Peerenboom J.P., and Kelly T.K. Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Systems, Control of Complex Networks 21 6 (2001) 11-64
-
(2001)
IEEE Control Systems, Control of Complex Networks
, vol.21
, Issue.6
, pp. 11-64
-
-
Rinaldi, S.M.1
Peerenboom, J.P.2
Kelly, T.K.3
-
2
-
-
38349013929
-
Modelling interdependencies between the electricity and information infrastructures
-
SAFECOMP, Springer, Nuremburg, Germany
-
Laprie J.C., Kanoun K., and Kaâniche M. Modelling interdependencies between the electricity and information infrastructures. SAFECOMP. LNCS vol. 4680/2008 (2007), Springer, Nuremburg, Germany 57-67
-
(2007)
LNCS
, vol.4680-2008
, pp. 57-67
-
-
Laprie, J.C.1
Kanoun, K.2
Kaâniche, M.3
-
3
-
-
10044242551
-
North America's electricity infrastructure: Are we ready for more perfect storms?
-
Massoud A. North America's electricity infrastructure: Are we ready for more perfect storms?. IEEE Security and Privacy 1 5 (2003) 19-25
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.5
, pp. 19-25
-
-
Massoud, A.1
-
4
-
-
46849103389
-
Access control for collaborative systems: A web services based approach
-
Salt Lake City Utah, USA, July
-
A. Abou El Kalam, Y. Deswarte, A. Baina, M. Kaâniche, Access control for collaborative systems: A web services based approach, in: IEEE Intl Conf. on Web Services, ICWS, Salt Lake City (Utah, USA), July 2007, pp. 11-64, 9-13
-
(2007)
IEEE Intl Conf. on Web Services, ICWS
-
-
Abou El Kalam, A.1
Deswarte, Y.2
Baina, A.3
Kaâniche, M.4
-
5
-
-
55549136774
-
A collaborative access control framework for critical infrastructures
-
Papa M., and Shenoi S. (Eds), Springer
-
Baina A., Abou El Kalam A., and Deswarte Y. A collaborative access control framework for critical infrastructures. In: Papa M., and Shenoi S. (Eds). Proc. of the Critical Infrastructure Protection II (2008), Springer 189-201
-
(2008)
Proc. of the Critical Infrastructure Protection II
, pp. 189-201
-
-
Baina, A.1
Abou El Kalam, A.2
Deswarte, Y.3
-
6
-
-
70349309679
-
Critical infrastructures security modeling, enforcement and runtime checking
-
3rd International Workshop on Critical Information Infrastructures Security (CRITIS'08). October 13-15, Springer, Rome, Italy doi:10.1007/978-3-642-03552-4_9
-
Abou El Kalam A., and Deswarte Y. Critical infrastructures security modeling, enforcement and runtime checking. 3rd International Workshop on Critical Information Infrastructures Security (CRITIS'08). October 13-15. LNCS vol. 5508/2009 (2008), Springer, Rome, Italy 95-108. http://dx.doi.10.1007/978-3-642-03552-4%5F9 doi:10.1007/978-3-642-03552-4_9
-
(2008)
LNCS
, vol.5508-2009
, pp. 95-108
-
-
Abou El Kalam, A.1
Deswarte, Y.2
-
9
-
-
0032027597
-
Modeling and analysis of workflows using petri nets
-
Workflow and Process Management (special issue)
-
Atluri V., Adam N.R., and Huang W.-K. Modeling and analysis of workflows using petri nets. Workflow and Process Management. Journal of Intelligent Information Systems (1998) (special issue)
-
(1998)
Journal of Intelligent Information Systems
-
-
Atluri, V.1
Adam, N.R.2
Huang, W.-K.3
-
10
-
-
57349171335
-
Policy decomposition for collaborative access control
-
CO, USA, ACM Digital Library
-
D. Lin, P. Rao, E. Bertino, N. Li, J. Lobo, Policy decomposition for collaborative access control, in: 13th ACM Symposium on Access Control Models and Technologies, Estes Park, CO, USA, ACM Digital Library, 2008, pp. 103-112
-
(2008)
13th ACM Symposium on Access Control Models and Technologies, Estes Park
, pp. 103-112
-
-
Lin, D.1
Rao, P.2
Bertino, E.3
Li, N.4
Lobo, J.5
-
11
-
-
71949101788
-
-
OASIS, XACML profile for Role Based Access Control, Committee Draft 01, 13 February 2004
-
OASIS, XACML profile for Role Based Access Control, Committee Draft 01, 13 February 2004
-
-
-
-
12
-
-
0001619596
-
Flexible support for multiple access control policies
-
E. Bertino, S. Jajodia, P. Samarati, Flexible support for multiple access control policies, ACM Transaction on Database Systems, 26 (2) 214-260
-
ACM Transaction on Database Systems
, vol.26
, Issue.2
, pp. 214-260
-
-
Bertino, E.1
Jajodia, S.2
Samarati, P.3
-
13
-
-
0001809810
-
The ponder policy specification language
-
IEE Computer Society Press, Bristol, UK
-
Demeanor N., Delay N., Lupus E., and Sloan M. The ponder policy specification language. International Workshop on Policies for Distributed Systems and Networks (2001), IEE Computer Society Press, Bristol, UK 18-38
-
(2001)
International Workshop on Policies for Distributed Systems and Networks
, pp. 18-38
-
-
Demeanor, N.1
Delay, N.2
Lupus, E.3
Sloan, M.4
-
14
-
-
3543052334
-
First experiences using XACML for access control in distributed systems
-
Fairfax, VA
-
M. Lorch, S. Proctor, R. Lepro, M. Field, S. Shah, First experiences using XACML for access control in distributed systems, in: ACM Workshop on XML Security, Fairfax, VA 2003
-
(2003)
ACM Workshop on XML Security
-
-
Lorch, M.1
Proctor, S.2
Lepro, R.3
Field, M.4
Shah, S.5
-
15
-
-
57349187679
-
An access control mechanism for P2P collaborations
-
Nantes, France. ACM, pp
-
C. Sturm, K.R. Dittrich, P. Ziegler, An access control mechanism for P2P collaborations, in: International Workshop on Data Management in Peer to Peer Systems, Nantes, France. ACM, pp. 51-58
-
International Workshop on Data Management in Peer to Peer Systems
, pp. 51-58
-
-
Sturm, C.1
Dittrich, K.R.2
Ziegler, P.3
-
16
-
-
33745771515
-
Secure collaboration in mediator-free environments
-
Alexandria, VA, USA, ACM Digital Library
-
M. Shehab, E. Bertino, A. Ghafoor, Secure collaboration in mediator-free environments, in: 12th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, ACM Digital Library, 2005, pp. 58-67
-
(2005)
12th ACM Conference on Computer and Communications Security
, pp. 58-67
-
-
Shehab, M.1
Bertino, E.2
Ghafoor, A.3
-
18
-
-
84883096028
-
A new access control model for distributed, heterogeneous and collaborative systems
-
Multi-OrBAC:, Sao Paulo, Brazil
-
A. Abou El Kalam, Y. Deswarte, Multi-OrBAC: A new access control model for distributed, heterogeneous and collaborative systems, in: IEEE Symp. on Systems and Information Security, Sao Paulo, Brazil, 2006
-
(2006)
IEEE Symp. on Systems and Information Security
-
-
Abou El Kalam, A.1
Deswarte, Y.2
-
19
-
-
85025819125
-
O2O: Virtual private organizations to manage security policy interoperability
-
India, December 17-21
-
F. Cuppens, N. Cuppens-Boulahia, C. Coma, O2O: Virtual private organizations to manage security policy interoperability, in: Second International Conference on Information Systems Security, ICISS 2006, India, December 17-21, 2006
-
(2006)
Second International Conference on Information Systems Security, ICISS
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
Coma, C.3
-
20
-
-
77952407814
-
Organization based access control
-
POLICY, Lake Come, Italy, Utah, USA, June
-
A. Abou El Kalam, R. El Baida, P. Balbiani, S. Benferhat, F. Cuppens, Y. Deswarte, A. Miege, C. Saurel, G. Trouessin, Organization based access control, in: Proc. of IEEE 4th Intl Workshop on Policies for Distributed Systems and Networks, POLICY, Lake Come, Italy, (Utah, USA), June 2003, pp. 120-134
-
(2003)
Proc. of IEEE 4th Intl Workshop on Policies for Distributed Systems and Networks
, pp. 120-134
-
-
Abou El Kalam, A.1
El Baida, R.2
Balbiani, P.3
Benferhat, S.4
Cuppens, F.5
Deswarte, Y.6
Miege, A.7
Saurel, C.8
Trouessin, G.9
-
21
-
-
0030086382
-
Role-based access control models
-
Sandhu R.S., Coyne E.J., Feinstein H.L., and Youman C.E. Role-based access control models. IEEE Computer 29 2 (1996) 38-47
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
22
-
-
84992227458
-
A proposed standard for role-based access control
-
Ferraiolo D., Sandhu R.S., Gavrila S., Kuhn D., and Chandramouli R. A proposed standard for role-based access control. ACM Transactions on Information and System Security 4 3 (2001)
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
-
-
Ferraiolo, D.1
Sandhu, R.S.2
Gavrila, S.3
Kuhn, D.4
Chandramouli, R.5
-
23
-
-
71949122681
-
-
W3C, XML, W3C Recommendation, February 2004
-
W3C, XML, W3C Recommendation, February 2004
-
-
-
-
24
-
-
71949083267
-
-
W3C, SOAP, W3C Recommendation, June 2003
-
W3C, SOAP, W3C Recommendation, June 2003
-
-
-
-
25
-
-
71949094908
-
-
W3C, WSDL, W3C Candidate Recommendation, March 2006
-
W3C, WSDL, W3C Candidate Recommendation, March 2006
-
-
-
-
26
-
-
71949087240
-
-
UDDI Specifications TC, February
-
OASIS, UDDI, UDDI Specifications TC, February 2005
-
(2005)
-
-
OASIS, U.1
-
27
-
-
85131828501
-
A framework for implementing role-based access control using CORBA security service
-
October 28-29, Fairfax, VA, USA, pp
-
K. Beznosov, Y. Deng, A framework for implementing role-based access control using CORBA security service, in: 4th ACM Workshop on Role-Based Access Control, October 28-29, 1999, Fairfax, VA, USA, pp. 19-30
-
(1999)
4th ACM Workshop on Role-Based Access Control
, pp. 19-30
-
-
Beznosov, K.1
Deng, Y.2
-
28
-
-
77954476833
-
Managing security policies in a distributed environment using eXtensible markup language
-
Las Vegas, Nevada, United States
-
N. Vuong, G. Smith, Y. Deng, Managing security policies in a distributed environment using eXtensible markup language, in: ACM Symposium on Applied Computing, Las Vegas, Nevada, United States, 2001, pp. 405-411
-
(2001)
ACM Symposium on Applied Computing
, pp. 405-411
-
-
Vuong, N.1
Smith, G.2
Deng, Y.3
-
29
-
-
10444282140
-
Role-based access control system for web services
-
September
-
X. Feng, L. Guoyuan, X. Xuzhou, Role-based access control system for web services, in: 4th International Conference on Computer and Information Technology, CIT'04, Wuhan, China, 14-16 September 2004, pp. 357-362
-
(2004)
4th International Conference on Computer and Information Technology, CIT'04, Wuhan, China, 14-16
, pp. 357-362
-
-
Feng, X.1
Guoyuan, L.2
Xuzhou, X.3
-
30
-
-
71949110112
-
A methodology for developing role-based access control to web-services
-
Leune K., Van W., and Heuvel H. A methodology for developing role-based access control to web-services. Infolab Technical Report Series vol. 11 (2002)
-
(2002)
Infolab Technical Report Series
, vol.11
-
-
Leune, K.1
Van, W.2
Heuvel, H.3
-
32
-
-
84893077785
-
Obligation monitoring in policy management
-
(Policy), Monterey, CA, 5-7 June, IEEE Computer Society Press
-
Bettini C., Jajodia S., Wang X.S., and Wijesekera D. Obligation monitoring in policy management. International Workshop on Policies for Distributed Systems and Networks. (Policy), Monterey, CA, 5-7 June (2002), IEEE Computer Society Press 2-12
-
(2002)
International Workshop on Policies for Distributed Systems and Networks
, pp. 2-12
-
-
Bettini, C.1
Jajodia, S.2
Wang, X.S.3
Wijesekera, D.4
-
33
-
-
57349158498
-
-
Q. Ni, E. Bertino, J. Lobo, An Obligation model bridging access control policies and privacy policies, in: 13th ACM SACMAT, Estes Park, CO, USA, June 11-13, 2008
-
Q. Ni, E. Bertino, J. Lobo, An Obligation model bridging access control policies and privacy policies, in: 13th ACM SACMAT, Estes Park, CO, USA, June 11-13, 2008
-
-
-
-
34
-
-
49249084578
-
A policy language for distributed usage control
-
Dresden, Germany, September 24-26
-
M. Hilty, A. Pretschner, D. Basin, C. Schaefer, T. Walter, A policy language for distributed usage control, in: 12th European Symposium On Research In Computer Security, ESORICS, Dresden, Germany, September 24-26, 2007
-
(2007)
12th European Symposium On Research In Computer Security, ESORICS
-
-
Hilty, M.1
Pretschner, A.2
Basin, D.3
Schaefer, C.4
Walter, T.5
-
35
-
-
71949128081
-
-
OASIS, eXtensible Access Control Markup Language TC v2.0, Normative XACML 2.0 documents
-
OASIS, eXtensible Access Control Markup Language TC v2.0, Normative XACML 2.0 documents
-
-
-
-
36
-
-
51849096343
-
The CRUTIAL architecture for critical information infrastructures
-
Architecting Dependable Systems V, Springer
-
Verissimo, Neves N.F., Correia M., Deswarte Y., Abou El Kalam A., Bondavalli A., and Daidone A. The CRUTIAL architecture for critical information infrastructures. Architecting Dependable Systems V. LNCS vol. 5135 (2008), Springer 1-27
-
(2008)
LNCS
, vol.5135
, pp. 1-27
-
-
Verissimo1
Neves, N.F.2
Correia, M.3
Deswarte, Y.4
Abou El Kalam, A.5
Bondavalli, A.6
Daidone, A.7
-
37
-
-
71949101232
-
-
F. Garrone, C. Brasca, D. Cerotti, D. Codetta Raiteri, A. Daidone, G. Deconinck, S. Donatelli, G. Dondossola, F. Grandoni, M. Kaaniche, T. Rigole, Analysis of new control applications, in: CRUTIAL project, Deliverable D2, January 2007
-
F. Garrone, C. Brasca, D. Cerotti, D. Codetta Raiteri, A. Daidone, G. Deconinck, S. Donatelli, G. Dondossola, F. Grandoni, M. Kaaniche, T. Rigole, Analysis of new control applications, in: CRUTIAL project, Deliverable D2, January 2007
-
-
-
-
38
-
-
71949127561
-
-
Organization for the advancement of structured information standards (2006), in: OASIS Web Services Security TC, Web Services Security v1.1 (WS-Security), February 2006
-
Organization for the advancement of structured information standards (2006), in: OASIS Web Services Security TC, Web Services Security v1.1 (WS-Security), February 2006
-
-
-
-
39
-
-
79951638419
-
-
available at
-
UPPAAL, Tool available at: http://www.uppaal.com
-
UPPAAL, Tool
-
-
-
41
-
-
0003450426
-
-
Springer. 3-540-41523-8
-
Berard B., Bidiot M., Finkel A., Larousinie F., Petit A., Petrucci L., Schnoebelen Ph., and McKenzie P. Systems and software verification, model checking techniques and tools (2001), Springer. 3-540-41523-8
-
(2001)
Systems and software verification, model checking techniques and tools
-
-
Berard, B.1
Bidiot, M.2
Finkel, A.3
Larousinie, F.4
Petit, A.5
Petrucci, L.6
Schnoebelen, Ph.7
McKenzie, P.8
-
42
-
-
84255207716
-
Supporting multiple levels of criticality
-
Munich, Germany, June
-
E. Totel, J.P. Blanquart, Y. Deswarte, D. Powell, Supporting multiple levels of criticality, in: 28th IEEE Fault Tolerant Computing Symposium, FTCS-28, Munich, Germany, June 1998, pp. 70-79
-
(1998)
28th IEEE Fault Tolerant Computing Symposium, FTCS-28
, pp. 70-79
-
-
Totel, E.1
Blanquart, J.P.2
Deswarte, Y.3
Powell, D.4
-
43
-
-
52249097466
-
Managing delegation in access control models
-
Guwahati, India, December 18-21
-
M. Ben Ghorbel, F. Cuppens, N. Cuppens-Boulahia, A. Bouhoula, Managing delegation in access control models. in: 15th International Conference on Advanced Computing and Communication, ADCOM'07, Guwahati, India, December 18-21, 2007
-
(2007)
15th International Conference on Advanced Computing and Communication, ADCOM'07
-
-
Ben Ghorbel, M.1
Cuppens, F.2
Cuppens-Boulahia, N.3
Bouhoula, A.4
|