The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Incorporating security requirements into system design models is receiving increasing interest. Access control requirements are an important part of overall system security requirements. Existing approaches that incorporate access control requirements into system design models have directly been developed on top of specific access control models. In these approaches, there exists a tight-coupling...
Commonly known access control systems respond to users' requests to perform actions on protected objects by giving binary answers such as permit or deny. The decisions are taken on the basis of access control policies, where the risk of allowing access is not necessarily taken into explicit consideration. In this paper, we introduce RBACR model (Role Based Access Control Model with Risk), in which...
There is a need for research on the scientific base and engineering requirements for building trustworthy systems in dynamic environments. To address this need, we study risk analysis for access control from the viewpoint of trust and demonstrate how to extend access control architectures to incorporate trust-based reasoning. We present a theoretical model which allows to reason about and manage risk...
In a set of access control policies, incompleteness is the existence of situations for which no policy applies. Some of these situations can be exploited by attackers, to obtain unintended access or to compromise integrity. Such cases can be difficult to foresee, since typical policy sets consist of thousands of rules. In this paper, we adopt data classification techniques widely used in the machine...
We present a risk management framework which allows to reason about and manage risk for role based access control systems. The framework expresses essential characteristics of risk management in dynamic environments, and can be used for assessing risk and decision making; it is flexible, and able to handle different access control requirements. This framework provides a basis for designing and implementation...
The reconstruction of absolute phase data from its wrapped phase is called Phase Unwrapping (PU). Usually, the absolute phase cannot be extracted from the fringe phase data directly. Ideally, without phase noise, singularity, and aliasing problems, the phase information can be unwrapped easily. However, the phase data are always contaminated by noise and discontinuities, making the PU process becomes...
This paper proposes robust key management scheme (RKM ): a new certification management scheme for mobile ad-hoc networks. RKM, based on threshold cryptography, ensures better robustness compared to other schemes proposed in the literature. In particular, it guarantees the confidentiality of the private key of the certification authority, even if the number of compromised nodes exceeds the threshold...
This paper describes unsupervised speech/speaker cluster validity measures based on a dissimilarity metric, for the purpose of estimating the number of clusters in a speech data set as well as assessing the consistency of the clustering procedure. The number of clusters is estimated by minimizing the cross-data dissimilarity values, while algorithm consistency is evaluated by calculating the dissimilarity...
This paper proposes a formal framework aimed at specifying and verifying computer systems security behavior. In this approach, systems and their interactions are modeled through processes with a new dedicated calculus inspired from the ambient calculus. We demonstrate how, given a network security policy implementation, our dedicated calculus allows to verify that the specification offers or not sufficient...
This paper introduces the Greenwood function cepstral coefficient (GFCC) and generalized perceptual linear prediction (GPLP) feature extraction models for the analysis of animal vocalizations across arbitrary species. These features are generalizations of the well-known mel-frequency cepstral coefficient (MFCC) and perceptual linear prediction (PLP) approaches, tailored to take optimal advantage of...
A cryptographic protocol is a distributed program that can be executed by several actors. Since several runs of the protocol within the same execution are allowed, models of cryptoprotocols are often infinite. Sometimes, for verification purposes, only a finite and approximated model is needed. For this, we consider the problem of computing such an approximation and we propose to simulate the required...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.