Learn More
In this paper, we investigate the use of Aspect-Oriented Programming (AOP) [13] in the domain of Mobile Ad-hoc NETworks (MANETs). More precisely we study the availability issues in Proac-tive routing protocols. This paper classifies the different possible attacks and examines the countermeasures to ensure availability. Our approach is based on a(More)
In existing systems, information are protected by security models that control the accesses to the information, depending on their security level. In such systems, allowing accesses that were previously denied by diminishing the security level of the information is called downgrading. Controlling this downgrade of sensitive information is an important issue(More)
—Standard multilevel security (MLS) policies lack flexibility as data classification is considered static. Previous works have addressed this issue and defined declassification requirements, especially in programming languages using a language-based security approach. In this paper, we suggest a different approach. We show how to define and enforce(More)
Many research works focused on modeling relational database management systems (DBMS) that support multilevel security (MLS) policies. However, most of these previous proposals only consider static aspects of relational databases and do not address dynamicity provided by mechanisms like triggers. Since such mechanisms introduced specific security problems,(More)
In the past years, Digital Rights Management (DRM) has been used in order to control media's resources usage, for instance for the consumers. Several proposals have been made in order to define what kind of controls one could apply and how to apply them. It has also been proposed more recently to use DRM mechanisms in the enterprises (EDRM), not to control(More)
In the literature, reputation systems are used to evaluate other entities behavior and have many applications such as, for instance, the detection of malicious entities. The associated models are based on mathematic formulae, in order to formaly dene elements such as the reputation evaluation and evolution and the reputation propagation between peers.(More)
In the literature, reputation systems are used to evaluate other entities behavior and have many applications such as, for instance, the detection malicious entities. The associated models are based on mathematic formulae, in order to formaly define elements such as the reputation evaluation and evolution and the reputation propagation between peers.(More)
Many research work focused on modeling relational database management systems (DBMS) that support multilevel security (MLS) policies. One issue in this context is the inference problem which occurs when it is possible to derive higher classified data from lower classified ones. This corresponds to situations where data is inconsistently classified. Research(More)
  • 1