Managing Risk and Information Security: Protect to Enable, 2012. ,
dynsmaug: A dynamic security management framework driven by situations, Cyber Security in Networking Conference (CSNet, pp.1-8, 2017. ,
Policy-based management of networked computing systems, IEEE Communications Magazine, vol.43, issue.10, pp.69-75, 2005. ,
Terminology for policy-based management, ietf rfc 3198, 2001. ,
PERMIS: a modular authorization infrastructure, Concurrency and Computation: Practice and Experience, vol.20, issue.11, pp.1341-1357, 2008. ,
A multi-domain security policy distribution architecture for dynamic IP based VPN management, 3rd International Workshop on Policies for Distributed Systems and Networks, pp.224-227, 2002. ,
An adaptive policy-based framework for network services management, Journal of Network and systems Management, vol.11, issue.3, pp.277-303, 2003. ,
Understanding and using context, Personal and ubiquitous computing, vol.5, issue.1, pp.4-7, 2001. ,
The situation underground, 1980. ,
Design and evaluation for situation awareness enhancement, Proceedings of the human factors and ergonomics society annual meeting, vol.32, pp.97-101, 1988. ,
Amit -the situation manager, The VLDB Journal-The International Journal on Very Large Data Bases, vol.13, issue.2, pp.177-203, 2004. ,
The power of events: An introduction to complex event processing in distributed enterprise systems, Workshop on Rules and Rule Markup Languages for the Semantic Web, p.3, 2008. ,
, eXtensible Access Control Markup Language (XACML) Version 3.0, 2013.
Guide to Attribute Based Access COntrol (ABAC) Definition and Considerations, NIST, Tech. Rep. SP, pp.800-162, 2016. ,
Toward authorization as a service: a study of the xacml standard, Proceedings of the 16th Communications & Networking Symposium. SCS, p.9, 2013. ,
Authorization policies: Using decision support system for context-aware protection of user's private data, Trust, Security and Privacy in Computing and Communications (TrustCom), International Conference on, pp.1639-1644, 2013. ,
Abbreviated Language for Authorization Version 1.0, 2015. ,
Event-driven rbac, Journal of Computer Security, vol.23, issue.6, pp.709-757, 2015. ,
Cbdac: context-based dynamic access control model using intuitive 5w1h for ubiquitous sensor network, International Journal of Distributed Sensor Networks, 2015. ,
Dynamic activation of role on rbac for ubiquitous applications, Convergence Information Technology, 2007. International Conference on, pp.1148-1153, 2007. ,
Situation-aware access control for service-oriented autonomous decentralized systems, Autonomous Decentralized Systems, pp.17-24, 2005. ,
An ontological framework for situation-aware access control of software services, Information Systems, vol.53, pp.253-277, 2015. ,
Specification and enforcement of dynamic authorization policies oriented by situations, New Technologies, Mobility and Security (NTMS), pp.1-6, 2014. ,
Managing Break-The-Glass using Situation-oriented authorizations, 9ème Conférence sur la Sécurité des Architectures Réseaux et Systèmes d'Information-SAR-SSI 2014, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01120112
From ambient sensing to iot-based context computing: An open framework for end to end qoc management, Sensors, vol.15, issue.6, pp.14-180, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01262395