ITEA2

Achieved dissemination actions

The list below shows the project activities related to dissemination along the project duration.

ITEA 2 Symposium 2009 Evidian, ATOS, Answare, Paris 12, Nextel, Innovalia, CityPassenger
June - 2010

ITEA 2 Symposium 2008 (Evidian)
June - 2010
Conference
Burton Group Catalyst conference, Prague Roundtable discussion about Role Management and User Provisioning (Evidian)
June - 2010
Analyst Conference
View
On the Composition of Access Control Management in Multidomain Environment.
June - 2010

View abstract

Walid Tfaili, Abdelghani Chibani, Yacine Amirat. Proceedings of the IEEE Information Reuse and Integration (IRI), Las Vegas (USA)

http://iri2009.cpsc.ucalgary.ca/

Secure interoperation between separately administrated domains, is becoming one of the major challenges in multidomain environments. In fact, many companies extend their business beyond traditional boundaries. To perform their tasks, employees must work from everywhere, and have access to applications belonging to other business units, suppliers, partners and affiliates. This is the case of most ubiquitous computing systems. As very little work has been done on

the composition of separately administrated heterogeneous access control policies, so very few information are available on the subject. We present in this paper a survey on composition methods of access control management as well as
mathematical proofs and complexity of composition methods. the complexity results prove that, even for a small number of domains and users in each domain the problem can be very complex. The composition problem can be formulated as an
optimization problem.

Using Timed Coloured Petri Nets and CPN-tool to Model and Verify TRBAC Security Policies.
May - 2010

View abstract

Laid Kahloul, Karim Djouani, Walid Tfaili. 4th International Workshop on Verification and Evaluation of Computer and Communication Systems The British Computer Society. Paris (France).

http://vecos.ensta.fr/2010/index.html

Role Based Access Control (RBAC) is one of the models used in designing and implementation of security policies in large networking systems. The classical model doesn’t consider temporal aspects which are so important in such policies. Temporal RBAC (TRBAC) is proposed to deal with this disadvantage. Although the elegance of these models, design a security policy remains a challenge. One is obliged to prove the consistency and the correctness of the policy. Using formal verification allows proving that the designed policy is consistent. In this paper1, we present a
formal modelling/analysis approach for TRBAC policies. We use Timed Colored Petri Nets to model the TRBAC policy, and then CPN-tool is used to analyze the generated models. The analysis allows proving many important properties about the TRBAC security policy.

Modeling and Verification of RBAC Security Policies Using Colored Petri Nets and CPN-tool.
April - 2010

View abstract

Laid Kahloul, Karim Djouani, Walid Tfaili. The second international conference on Networked Digital Technologies in the “Communications in Computer and Information Science” (CCIS) Series of Springer LNCS. Prague, (Czech Republic)

Role Based Access Control (RBAC) is more and more applied to design and implement security policies in large networking systems. Although the elegance of this model, the design process of a security policy is a challenge. The consistence and the correctness of the policy are crucial. Formal verification is one of the techniques, which can be used to prove that the designed policy is consistent. In this paper, we present a concrete formal modeling/analysis approach for RBAC policies. The modeling phase uses Colored Petri Nets. The generated models will be analyzed using the CPN-tool.
This analysis will wallow to prove many important proprieties about the RBAC security policy.

 

Nextel day 2009 (Nextel)
December - 2009
Conference
View
News on the website of ATOS (ATOS)
December - 2009
Web site news
View
XI Jornadas de Seguridad (Nextel)
November - 2009
Conference
View
Celtic meeting Presentation of MULTIPOL to the "Federated Testbed for Public Safety Communication" Celtic project (Nextel)
November - 2009

GITEX Technological Week (Evidian)
October - 2009
Exhibition
View
Kuppinger Cole annual briefing (Evidian)
October - 2009
Analyst briefing
Innovalia day 2009 (Innovalia, Nextel)
July - 2009
Conference
US-France young engineering scientists symposium 2009 Paris 12
July - 2009
Conference
View
Burton Group annual briefing (Evidian)
June - 2009
Analyst briefing
Press Release at Nueva Gestion (Nextel)
May - 2009
Web site news
View
Press Release at Redes Telecom, Network World, Europa Press, Eco Diario, Terra, Yahoo (Nextel)
April - 2009
Web site news
View
Gartner IAM summit 2009, London (Evidian)
March - 2009
Conference
View
European Experts Meeting on Technologies for Electronic Identification (Evidian)
March - 2009
Conference
View
News on the web site of the Innovalia Association (Innovalia)
December - 2008
Web site news
View
Article in the “Telecom” french review, special issue on Security (Evidian)
December - 2008
Press paper
View
News on the web site of the European Software Institute (ESI)
December - 2008
Web site news
View
Martin Kuppinger paper about the launching of Multipol (Evidian )
August - 2008
Analyst briefing
View
Bull worldwide newsletter (Evidian)
July - 2008
Newsletter
View
Flyer edited for Gartner IAM summit 2008, London. Associated Press Release about launching of MULTIPOL. Article on Evidian blog. (Evidian)
June - 2008
Analyst Conference
View

The partners

  • Evidian
  • Answare Tech
  • Atos Origin
  • City Passenger
  • EADS
  • ESI
  • Innovalia Association
  • Nextel
  • Thales
  • University of Paris

 

The project is co-founded by the Spanish Ministry of Industry, Tourism and Comerce and the FEDER.

MYTIC - FEDER

Avanza 2