totally automatic generation process of security rules
could ensure the security of all resources. Therefore
the ultimate validation of the security rules is the de-
cision of the administrator. However, even if the se-
curity administrator has to define some of the security
rules, their effort of creating them is still reduced.
A limitation of our approach is the sharing of in-
formation in the ontology of the consumer organiza-
tion. This ontology may include essential and sensi-
tive information of the organization. Regarding the
ontology matching, it is possible to apply other meth-
ods and tools, which may increase the accuracy of
the results. For the moment we only use roles for
the matching analysis, but other entities like resources
and actions could be used to improve the similarity.
REFERENCES
Abi Haidar, D., Cuppens-Boulahia, N., Cuppens, F., and
Debar, H. (2009). Xena: an access negotiation frame-
work using xacml. Annales des t
´
el
´
ecommunications-
Annals of telecommunications, 64(1-2):155 – 169.
Ameziane El Hassani, A., Abou El Kalam, A., Bouhoula,
A., Abassi, R., and Ait Ouahman, A. (2015). Integrity-
orbac: A new model to preserve critical infrastructures
integrity. Int. J. Inf. Secur., 14(4):367–385.
Baina, A., Kalam, A., Deswarte, Y., and Kaaniche, M.
(2008). Collaborative access control for critical infras-
tructures. In Papa, M. and Shenoi, S., editors, Crit-
ical Infrastructure Protection II, volume 290 of The
International Federation for Information Processing,
pages 189–201. Springer US.
Baina, A. and Laarouchi, Y. (2012). Multilevel-orbac:
Multi-level integrity management in organization
based access control framework. In Multimedia
Computing and Systems (ICMCS), 2012 International
Conference on, pages 933–938.
Chandrasekaran, B., Josephson, J. R., and Benjamins, V. R.
(1999). What are ontologies, and why do we need
them? IEEE Intelligent Systems, 14(1):20–26.
Choi, N., Song, I.-Y., and Han, H. (2006). A survey on
ontology mapping.
Coma, C., Cuppens-Boulahia, N., and Cuppens, F. (2010).
Secure interoperability with o2o contracts. In Web-
Based Information Technologies and Distributed Sys-
tems, volume 2 of Atlantis Ambient and Pervasive In-
telligence, pages 257–292.
Coma, C., Cuppens-Boulahia, N., Cuppens, F., and Cavalli,
A. R. (2008). Interoperability of context based system
policies using o2o contract. In Chbeir, R., Dipanda,
A., and Y
´
etongnon, K., editors, SITIS, pages 137–144.
IEEE Computer Society.
Coma-Brebel, C., Cuppens-Boulahia, N., Cuppens, F., and
Cavalli, A. R. (2008). Context ontology for secure
interoperability. In ARES 2008 : Third international
conference on availability, reliability and security.
Cuppens, F., Cuppens-Boulahia, N., and Coma, C. (2006).
O2o: Virtual private organizations to manage security
policy interoperability. In Bagchi, A. and Atluri, V.,
editors, Information Systems Security, volume 4332
of LNCS, pages 101–115.
Deswarte, Y. (2011). Protecting critical infrastructures
while preserving each organization’s autonomy. In
Natarajan, R. and Ojo, A., editors, Distributed Com-
puting and Internet Technology, volume 6536 of
LNCS, pages 15–34.
El Kalam, A., Deswarte, Y., Baina, A., and Kaaniche, M.
(2007). Access control for collaborative systems: A
web services based approach. In Web Services, 2007.
ICWS 2007. IEEE International Conference on, pages
1064–1071.
El Kalam, A. A. and Deswarte, Y. (2006). Multi-orbac:
A new access control model for distributed, heteroge-
neous and collaborative systems. In 8th IEEE Inter-
national Symposium on Systems and Information Se-
curity.
El Maarabani, M., Cavalli, A., Hwang, I., and Zaidi, F.
(2011). Verification of interoperability security poli-
cies by model checking. In High-Assurance Systems
Engineering (HASE), 2011 IEEE 13th International
Symposium on, pages 376–381.
Kalam, A., Baida, R., Balbiani, P., Benferhat, S., Cuppens,
F., Deswarte, Y., Miege, A., Saurel, C., and Trouessin,
G. (2003). Organization based access control. In Poli-
cies for Distributed Systems and Networks, IEEE 4th
Intl Wksh on, pages 120–131.
Kalam, A. A. E., Deswarte, Y., Baina, A., and Ka
ˆ
aniche,
M. (2009). Polyorbac: A security framework for crit-
ical infrastructures. International Journal of Critical
Infrastructure Protection, 2(4):154 – 169.
Muante-Arzapalo, D. Y. (2014). Une approche base sur
l’Ing
´
enierie Dirig
´
ee par les mod
`
eles pour identifier,
concevoir et
´
evaluer des aspects s
´
ecurit
´
e. PhD thesis,
Universit
´
e de Pau et des Pays de L’Adour.
Nasser, B., Laborde, R., Benzekri, A., Barr
`
ere, F., and
Kamel, M. (2005a). Access control model for inter-
organizational grid virtual organizations. In Meers-
man, R., Tari, Z., and Herrero, P., editors, On the
Move to Meaningful Internet Systems 2005: OTM
2005 Workshops, volume 3762 of LNCS, pages 537–
551.
Nasser, B., Laborde, R., Benzekri, A., Barrere, F., and
Kamel, M. (2005b). Dynamic creation of inter-
organizational grid virtual organizations. In e-Science
and Grid Computing, 2005. First International Con-
ference on, pages 8 pp.–412.
Pavel, S. and Euzenat, J. (2013). Ontology matching: State
of the art and future challenges. IEEE Trans. on
Knowl. and Data Eng., 25(1):158–176.
Preda, S., Cuppens, F., Cuppens-Boulahia, N., Garcia-
Alfaro, J., and Toutain, L. (2011). Dynamic deploy-
ment of context-aware access control policies for con-
strained security devices. Journal of Systems and Soft-
ware, 84(7):1144 – 1159.
Toumi, K., Andr
´
es, C., and Cavalli, A. R. (2013). Trust
ontology based on access control parameters in multi-
organization environments. In SITIS, pages 285–292.
Toumi, K., Cavalli, A., and El Maarabani, M. (2012). Role
based interoperability security policies in collabora-
tive systems. In Collaboration Technologies and Sys-
tems (CTS), 2012 International Conference on, pages
471–477.
ENASE 2016 - 11th International Conference on Evaluation of Novel Software Approaches to Software Engineering
50