58 4.4.1 Basic Roles, p.60 ,
67 4.7.1 NS-N: Network Structure for Nodes, Network Structure for Permissions, p.68 ,
76 4.9.1 The XACML, p.78 ,
82 5.1.1 Context-Aware Updates, p.83 ,
95 5.5.1 Context-Aware Information, p.97 ,
111 6.1.1 Regular Roles and Node-Role Assignment, 112 6.1.2 Permissions and Permission-Role Assignment . . . . . . . . . . . . . 114 ,
118 6.2.3 Evolution Scenario 1: Visitor, Evolution Scenario, vol.2, p.124 ,
Autonomic network architecture ,
Organization based access control, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, 2003. ,
DOI : 10.1109/POLICY.2003.1206966
URL : https://hal.archives-ouvertes.fr/hal-01483818
Autonomic trust reasoning enables misbehavior detection in OLSR, Proceedings of the 2008 ACM symposium on Applied computing , SAC '08, 2008. ,
DOI : 10.1145/1363686.1364173
URL : https://hal.archives-ouvertes.fr/hal-00353032
Modèles et protocoles de sécurité pour un réseau domestique, 2005. ,
Sécurité des réseaux mobiles autonomes, Actes du Premier workshop GET sur les réseaux spontanés, 2006. ,
Autonomic Security for Home Networks, Proceedings of the First International Workshop on Self-Organizing Systems, 2006. ,
DOI : 10.1007/11822035_21
A Security Policy System for Mobile Autonomic Networks, Proceedings of the 1st International ICST Conference on Autonomic Computing and Communication Systems, 2007. ,
DOI : 10.4108/ICST.AUTONOMICS2007.2205
Towards an autonomic security system for mobile ad hoc networks, Proceedings of the Third International Symposium on Information Assurance and Security, 2007. ,
Security Solutions in Mobile Autonomic Networks, 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, 2008. ,
DOI : 10.1109/ICTTA.2008.4530194
ASRBAC: A Security Administration Model for Mobile Autonomic Networks (MAutoNets), Proceedings of the Second International Workshop on Autonomous and Spontaneous Security, 2009. ,
DOI : 10.1007/978-3-642-11207-2_13
Management of Conflicting Obligations in Self-Protecting Policy-Based Systems, Second International Conference on Autonomic Computing (ICAC'05), 2005. ,
DOI : 10.1109/ICAC.2005.38
Core and Hierarchical Role Based Access Control (RBAC) Profile of XACML v2.0. OASIS, 2005. ,
A Policy-Definition Language and Prototype Implementation Library for Policy-based Autonomic Systems, 2006 IEEE International Conference on Autonomic Computing, 2006. ,
DOI : 10.1109/ICAC.2006.1662407
A model of OASIS role-based access control and its support for active security, ACM Transactions on Information and System Security, vol.5, issue.4, 2002. ,
DOI : 10.1145/581271.581276
Status-Based Access Control, ACM Transactions on Information and System Security, vol.12, issue.1, 2008. ,
DOI : 10.1145/1410234.1410235
Supporting relationships in access control using role based access control, Proceedings of the fourth ACM workshop on Role-based access control , RBAC '99, 1999. ,
DOI : 10.1145/319171.319177
Usable autonomic computing systems: The system administrators' perspective, Proceedings of the First International Conference on Autonomic Computing, 2004. ,
DOI : 10.1016/j.aei.2004.11.001
TRBAC, Proceedings of the fifth ACM workshop on Role-based access control , RBAC '00, 2001. ,
DOI : 10.1145/344287.344298
X-gtrbac admin: A decentralized administration model for enterprise-wide access control, ACM Transactions on Information and System Security, 2005. ,
Using trust for secure collaboration in uncertain environments, IEEE Pervasive Computing, vol.2, issue.3, 2003. ,
DOI : 10.1109/MPRV.2003.1228527
Self-organized public-key management for mobile ad hoc networks, IEEE Transactions on Mobile Computing, vol.2, issue.1, 2003. ,
DOI : 10.1109/TMC.2003.1195151
CARISMA: Context-Aware Reflective mIddleware System for Mobile Applications, IEEE Transactions on Software Engineering, vol.29, issue.10, 2003. ,
DOI : 10.1109/TSE.2003.1237173
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.324.4706
Managing security policy in a large distributed web services environment, Proceedings of the 27th Annual International Conference on Computer Software and Applications, 2003. ,
Securing context-aware applications using environment roles, Proceedings of the sixth ACM symposium on Access control models and technologies , SACMAT '01, 2001. ,
DOI : 10.1145/373256.373258
Administrative scope and role hierarchy operations, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, 2002. ,
DOI : 10.1145/507711.507736
Administrative scope, ACM Transactions on Information and System Security, vol.6, issue.2, 2003. ,
DOI : 10.1145/762476.762478
Cuppens-Boulahia, and C. Coma. Multi-granular licences to decentralize security administration, Proceedings of the First International Workshop on Reliability, Availability and Security, 2007. ,
Administration model for or-bac. In On The Move to Meaningful Internet Systems, 2003. ,
DOI : 10.1007/978-3-540-39962-9_76
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.138.2905
Specifying a security policy: a case study, Proceedings 9th IEEE Computer Security Foundations Workshop, 1996. ,
DOI : 10.1109/CSFW.1996.503697
A survey of policy specification approaches, 2002. ,
The Ponder Policy Specification Language, Proceedings of the International Workshop on Policies for Distributed Systems and Networks, 2001. ,
DOI : 10.1007/3-540-44569-2_2
Formal refinement patterns for goal-driven requirements elaboration, Proceedings of the 4th ACM SIGSOFT Symposium on Foundations of Software Engineering, 1996. ,
RBAC administration in distributed systems, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, 2008. ,
DOI : 10.1145/1377836.1377852
Putting Meaning into the Network: Some Semantic Issues for the Design of Autonomic Communications Systems, Proceedings of the 1st International Workshop on Autonomic Communication, 2005. ,
DOI : 10.1007/11520184_16
Achieving an acceptable design model for autonomic systems, Fourth IEEE International Workshop on Engineering of Autonomic and Autonomous Systems (EASe'07), 2007. ,
DOI : 10.1109/EASE.2007.4
Hybridising events and knowledge as a basis for building autonomic systems, Journal of Trusted and Autonomic Computing, 2006. ,
A survey of autonomic communications, ACM Transactions on Autonomous and Adaptive Systems, vol.1, issue.2, 2006. ,
DOI : 10.1145/1186778.1186782
A multiagent-based approach for managing security policy, Proceedings of the Second IFIP International Conference on Wireless and Optical Communications Networks, 2005. ,
Spontaneous networking: an application oriented approach to ad hoc networking, IEEE Communications Magazine, vol.39, issue.6, 2001. ,
DOI : 10.1109/35.925687
Dynamic Self-management of Autonomic Systems: The Reputation, Quality and Credibility (RQC) Scheme, Proceedings of the 1st IFIP TC6 WG6.6 International Workshop on Autonomic Communication, 2004. ,
DOI : 10.1007/11520184_13
Towards autonomic networks, International Symposium on Applications and the Internet (SAINT'06), 2006. ,
DOI : 10.1109/SAINT.2006.54
Steps toward self-aware networks, Communications of the ACM, vol.52, issue.7, 2009. ,
DOI : 10.1145/1538788.1538809
Managing Delegation in Access Control Models, 15th International Conference on Advanced Computing and Communications (ADCOM 2007), 2007. ,
DOI : 10.1109/ADCOM.2007.105
A logic for reasoning about security, ACM Transactions on Computer Systems, 1992. ,
Using first-order logic to reason about policies, ACM Transactions on Information and System Security, 2008. ,
DOI : 10.1145/1380564.1380569
URL : http://arxiv.org/abs/cs/0601034
Autonomic computing: Ibm's perspective on the state of information technology, IBM Research, 2001. ,
A logical language for expressing authorizations, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), 1997. ,
DOI : 10.1109/SECPRI.1997.601312
Implementation of an Agent-Oriented Trust Management Infrastructure Based on a Hybrid PKI Model, Proceedings of the 1st International Conference on Trust Management, 2003. ,
DOI : 10.1007/3-540-44875-6_23
PEACE: A Policy-Based Establishment of Ad-hoc Communities, 20th Annual Computer Security Applications Conference, 2004. ,
DOI : 10.1109/CSAC.2004.26
Research challenges of autonomic computing, Proceedings of the 27th International Conference on Software Engineering, 2005. ,
The vision of autonomic computing, Computer, vol.36, issue.1, 2003. ,
DOI : 10.1109/MC.2003.1160055
Engineering Self-protection for Autonomous Systems, Proceedings of the 9th International Conference on Fundamental Approaches to Software Engineering, 2006. ,
DOI : 10.1007/11693017_5
E Pluribus Unum, Proceedings of the 1st IFIP TC6 WG6.6 International Workshop on Autonomic Communication, 2004. ,
DOI : 10.1007/11520184_14
Interactive Access Control for Web Services, Proceedings of the 19th IFIP Information Security Conference, 2004. ,
DOI : 10.1007/1-4020-8143-X_10
Towards autonomic security in beyond 3g infrastructures -end-toend reconfigurability ii white paper, 2007. ,
Protection, Proceedings of the 5th Princeton Symposium on Information Science and Systems, 1971. ,
DOI : 10.1145/775265.775268
Run-Time Enforcement of Nonsafety Policies, ACM Transactions on Information and System Security, vol.12, issue.3, 2009. ,
DOI : 10.1145/1455526.1455532
Awareness in collaborative ubiquitous environments, ACM Transactions on Autonomous and Adaptive Systems, vol.2, issue.4, 2007. ,
DOI : 10.1145/1293731.1293733
A Distributed Domain Administration of RBAC Model in Collaborative Environments, 2006 10th International Conference on Computer Supported Cooperative Work in Design, 2006. ,
DOI : 10.1109/CSCWD.2006.253050
Self-securing ad hoc wireless networks, Proceedings of the 7th IEEE Symposium on Computers and Communications, 2002. ,
Xacml policy integration algorithms, ACM Transactions on Information and System Security, 2008. ,
A security design for a general purpose, self-organizing, multi-hop ad-hoc wireless network, Proceedings of the First ACM Workshop on Security of Ad-hoc and Sensor Networks, 2003. ,
Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks, Proceedings of the IFIP 6th Joint Working Conference on Communications and Multimedia Security, 2002. ,
DOI : 10.1007/978-0-387-35612-9_9
Definition of a Formal Framework for Specifying Security Policies. The Or-BAC Model and Extensions, 2005. ,
URL : https://hal.archives-ouvertes.fr/pastel-00001376
The autokey security architecture, protocol and algorithms, 2006. ,
An improved administration method on role-based access control in the enterprise environment, Journal of Information Science and Engineering, 2001. ,
A model for role administration using organization structure, Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, 2002. ,
An effective role administration model using organization structure, ACM Transactions on Information and System Security, vol.9, issue.2, 2006. ,
DOI : 10.1145/1151414.1151415
Configuring role-based access control to enforce mandatory and discretionary access control policies, ACM Transactions on Information and System Security, vol.3, issue.2, 2000. ,
DOI : 10.1145/354876.354878
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.25.8753
Design of sps model using mobile agent system, Proceedings of the IEEE 37th Annual International Carnahan Conference on Security Technology, 2003. ,
usage control model, ACM Transactions on Information and System Security, vol.7, issue.1, 2004. ,
DOI : 10.1145/984334.984339
Trust establishment in pure ad-hoc networks. Wireless Personal Communications, 2006. ,
Specifying protocols for multi-agent systems interaction, ACM Transactions on Autonomous and Adaptive Systems, vol.2, issue.4, 2007. ,
DOI : 10.1145/1293731.1293735
Secure long term communities in ad hoc networks, Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks , SASN '03, 2003. ,
DOI : 10.1145/986858.986874
Cross-layer architectures for autonomic communications, Journal of Network and Systems Management, 2006. ,
CONFIDANT: Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions, Autonomous Agents and Multi-Agent Systems, vol.10, issue.1, 2006. ,
DOI : 10.1007/s10458-005-4195-6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.3383
Self management and the future of software design, 2006. ,
Self-adaptive software, ACM Transactions on Autonomous and Adaptive Systems, vol.4, issue.2, 2009. ,
DOI : 10.1145/1516533.1516538
The arbac97 model for role-based administration of roles, ACM Transactions on Information and System Security, 1999. ,
The NIST model for role-based access control, Proceedings of the fifth ACM workshop on Role-based access control , RBAC '00, 2000. ,
DOI : 10.1145/344287.344301
The ARBAC99 model for administration of roles, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99), 1999. ,
DOI : 10.1109/CSAC.1999.816032
Secure information sharing enabled by Trusted Computing and PEI models, Proceedings of the 2006 ACM Symposium on Information, computer and communications security , ASIACCS '06, 2006. ,
DOI : 10.1145/1128817.1128820
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.160.9724
Lattice-based access control models, Computer, vol.26, issue.11, 1993. ,
DOI : 10.1109/2.241422
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.29.5742
Role-based access control models, Computer, vol.29, issue.2, 1996. ,
DOI : 10.1109/2.485845
TrustBuilder: negotiating trust in dynamic coalitions, Proceedings DARPA Information Survivability Conference and Exposition, 2003. ,
DOI : 10.1109/DISCEX.2003.1194912
Evolution of cooperation in ad hoc networks under game theoretic model, Proceedings of the international workshop on Mobility management and wireless access , MobiWac '06, 2006. ,
DOI : 10.1145/1164783.1164807
Secure interoperation in a multidomain environment employing RBAC policies, IEEE Transactions on Knowledge and Data Engineering, vol.17, issue.11, 2005. ,
DOI : 10.1109/TKDE.2005.185
Secure collaboration in mediator-free environments, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, 2005. ,
DOI : 10.1145/1102120.1102130
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.159.456
Moving from the design of usable security technologies to the design of useful secure applications, Proceedings of the 2002 workshop on New security paradigms , NSPW '02, 2002. ,
DOI : 10.1145/844102.844117
Autonomic communication: Research agenda for a new communication paradigm, 2004. ,
DOI : 10.1007/b138981
The Resurrecting Duckling: security issues for ubiquitous computing, Computer, vol.35, issue.4, 2002. ,
DOI : 10.1109/MC.2002.1012427
Team-based access control (TMAC), Proceedings of the second ACM workshop on Role-based access control , RBAC '97, 1997. ,
DOI : 10.1145/266741.266748
Task-based authorization controls (TBAC): a family of models for active and enterprise-oriented authorization management, Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects, 1997. ,
DOI : 10.1007/978-0-387-35285-5_10
Access control in collaborative systems, ACM Computing Surveys, vol.37, issue.1, 2005. ,
DOI : 10.1145/1057977.1057979
An Adaptable Security Framework for Service-based Systems, 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems, 2005. ,
DOI : 10.1109/WORDS.2005.15
Spray computers: Explorations in self-organization, Pervasive and Mobile Computing, vol.1, issue.1, 2005. ,
DOI : 10.1016/j.pmcj.2005.01.001
Dynamic context-aware access control for grid applications, Proceedings. First Latin American Web Congress, 2003. ,
DOI : 10.1109/GRID.2003.1261704
Toward a Usage-Based Security Framework for Collaborative Computing Systems, ACM Transactions on Information and System Security, vol.11, issue.1, 2008. ,
DOI : 10.1145/1330295.1330298
Formal model and policy specification of usage control, ACM Transactions on Information and System Security, vol.8, issue.4, 2005. ,
DOI : 10.1145/1108906.1108908
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.161.2670
ROBAC: Scalable Role and Organization Based Access Control Models, 2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing, 2006. ,
DOI : 10.1109/COLCOM.2006.361879
Towards a Scalable Role and Organization Based Access Control Model with Decentralized Security Administration, Handbook of Research on Social and Organizational Liabilities in Information Security. Information Science Reference, 2009. ,
DOI : 10.4018/978-1-60566-132-2.ch006
A collaborative approach to autonomic security protocols, Proceedings of the 2004 workshop on New security paradigms , NSPW '04, 2004. ,
DOI : 10.1145/1065907.1066029