, Elasticsearch Logstash
,
Modeling of A-Posteriori Access Control in Business Processes, 2012 IEEE 36th Annual Computer Software and Applications Conference Workshops, pp.403-408, 2012. ,
Reconciling IHE-ATNA profile with a posteriori contextual access and usage control policy in healthcare environment, Sixth International Conference on Information Assurance and Security, pp.197-203, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-00540774
A posteriori access and usage control policy in healthcare environment, Journal of information assurance and security, vol.6, pp.389-397, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00640655
Ontology based log content extraction engine for a posteriori security control, Studies in health technology and informatics, vol.180, pp.746-750, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00868711
The description logic handbook: Theory, implementation and applications, 2003. ,
CARDS-collaborative audit and report data sharing for a-posteriori access control in DOSNs, 2015 IEEE Conference on Collaboration and Internet Computing (CIC), pp.36-45, 2015. ,
Secure computer system unified exposition and multics interpretation, Commun. ACM, vol.1, pp.271-280, 1988. ,
PAIRSE: a privacy-preserving serviceoriented data integration system, ACM SIGMOD Record, vol.42, pp.42-47, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-01124429
Ioannis Stavrakantonakis, Nektarios Gioldasis, and Stavros Christodoulakis, The SPARQL2XQuery interoperability framework. World Wide Web, vol.18, pp.403-490, 2015. ,
Semantic mediator querying, Proceedings of the 18th International Database Engineering & Applications Symposium. ACM, pp.29-38, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01198496
Ontop: Answering SPARQL queries over relational databases, Semantic Web, vol.8, pp.471-487, 2017. ,
An audit logic for accountability, Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05), pp.34-43, 2005. ,
The audit logic: Policy compliance in distributed systems, Jeremy den Hartog, and Gabriele Lenzini, 2006. ,
A logic for auditing accountability in decentralized systems, In IFIP World Computer Congress, TC, vol.1, pp.187-201, 2004. ,
François Scharffe, and Cássia Trojahn dos Santos, vol.2, pp.3-10, 2011. ,
Providing security and interoperation of heterogeneous systems, Security of Data and Transaction Processing, pp.119-145, 2000. ,
, Authorization specification and enforcement in federated database systems, Journal of Computer Security, vol.5, pp.155-188, 1997.
Audit-Based Access Control for, Electronic Notes in Theoretical Computer Science, vol.168, pp.221-236, 2007. ,
Audit-based access control for electronic health records, Electronic Notes in Theoretical Computer Science, vol.168, pp.221-236, 2007. ,
DeepLog : Anomaly Detection and Diagnosis from System Logs through Deep Learning, pp.1285-1298, 2017. ,
A Multi-agent system using semantic metadata for the cooperation among multiple information sources, p.4, 2000. ,
, European Conf. on Principles and Practice of Knowledge Discovery in Databases
Or-BAC: un modèle de contrôle d'accès basé sur les organisations. Cahiers francophones de la recherche en sécurité de l'information, vol.1, pp.30-43, 2003. ,
A complete translation from SPARQL into efficient SQL, Proceedings of the 2009 International Database Engineering & Applications Symposium, pp.31-42, 2009. ,
The Meaning of Logs ,
,
, A Posteriori Compliance Control Categories and Subject Descriptors, pp.11-20
An API for ontology alignment, International Semantic Web Conference, pp.698-712, 2004. ,
URL : https://hal.archives-ouvertes.fr/hal-00825931
Role-based access control (RBAC): Features and motivations, Proceedings of 11th annual computer security application conference, pp.241-289, 1995. ,
R OWL BAC: representing role based access control in OWL, Proceedings of the 13th ACM symposium on Access control models and technologies, pp.73-82, 2008. ,
Creating an IHE ATNA-based audit repository, Journal of digital imaging, vol.19, issue.4, pp.307-315, 2006. ,
Guide to attribute based access control (abac) definition and considerations (draft), NIST special publication, vol.800, p.162, 2013. ,
Guide to computer security log management, NIST special publication, p.92, 2006. ,
Resource description framework (RDF): Concepts and abstract syntax, 2006. ,
Sparql rewriting for query mediation over mapped ontologies, Nektarios Gioldasis, Nikos Bikakis, and Stavros Christodoulakis, 2010. ,
Use of Machine Learning in Big Data Analytics for Insider Threat Detection ,
, OWL web ontology language overview. W3C recommendation, vol.10, 2004.
Privacy-preserving semantic interoperation and access control of heterogeneous databases, Proceedings of the 2006 ACM Symposium on Information, pp.66-77, 2006. ,
Semantic access control for information interoperation, Proceedings of the eleventh ACM symposium on Access control models and technologies, pp.237-246, 2006. ,
Sparql query language for rdf, 2006. ,
Concept-level access control for the semantic web, Proceedings of the 2003 ACM workshop on XML security, pp.94-103, 2003. ,
OREL: an ontology-based rights expression language, Proceedings of the 13th international World Wide Web conference on Alternate track papers & posters. ACM, pp.324-325, 2004. ,
Representing attribute based access control policies in owl, 2016 IEEE Tenth International Conference on Semantic Computing (ICSC), pp.333-336, 2016. ,
Discretionary Access Control Policies (DAC), pp.356-358, 2011. ,
Anomaly Detection using Process Mining, pp.1-13 ,
Mediators in the architecture of future information systems, Computer, vol.25, pp.38-49, 1992. ,