In emerging e-commerce applications, time constrained information sharing between different systems is becoming a common phenomenon. A flexible and efficient mechanism is needed t...
The growing diffusion of portable devices enables users to benefit from anytime and anywhere impromptu collaboration. Appropriate policy models that take into account the dynamici...
One of the major threats that an enterprise Information system networks are facing today is the Insider threat. As part of the Insider Threat study, lack of an effective access co...
Information security is based on access control models and cryptographic techniques. These are well established areas of research in computer security, but are not capable of supp...
This paper proposes a modelling of information security policies in the framework of possibilistic logic. Our modelling is based on the concept of roles associated with users. Acc...