[1]
Security policy conflicts in service-oriented systems (Bartosz Brodecki, Piotr Sasak, Michał Szychowiak),
In New Generation Computing,
Ohmsha, Ltd., volume (to be published), 2012, pp. ??-??,
[bib]@ARTICLE{BSS12,
author = {Bartosz Brodecki and Piotr Sasak and Michał Szychowiak},
affiliation = {Poznan University of Technology},
title = {Security policy conflicts in service-oriented systems},
journal = {New Generation Computing},
publisher = {Ohmsha, Ltd.},
year = {2012},
volume = {(to be published)},
pages = {??--??},
}
[2]
Problemy bezpieczeństwa w architekturze SOA (Bartosz Brodecki, Jerzy Brzeziński, Piotr Sasak, Michał Szychowiak),
Chapter in Nauka w obliczu społeczeństwa cyfrowego. I Konferencja i3: internet - infrastruktury - informacje (Damian Niemir, Maciej Stroiński, Jan Węglarz, eds.),
Ośroder Wydawnictw Naukowych, 2010, pp. 233-246,
[pdf][bib]@INCOLLECTION{BDS+10,
author = {Bartosz Brodecki and Jerzy Brzeziński and Piotr Sasak and Michał Szychowiak},
title = {Problemy bezpieczeństwa w architekturze SOA},
booktitle = {Nauka w obliczu społeczeństwa cyfrowego. I Konferencja i3: internet - infrastruktury - informacje},
publisher = {Ośroder Wydawnictw Naukowych},
institution = {Instytut Chemii Bioorganicznej PAN},
isbn = {978-83-7712-032-3},
year = {2010},
editor = {Damian Niemir and Maciej Stroiński and Jan Węglarz},
pages = {233--246},
url = {http://www.cs.put.poznan.pl/bbrodecki/publikacje/BestPractices_2010.pdf}
}
[3]
Selected aspects of management in SOA (Bartosz Brodecki, Jerzy Brzeziński, Dariusz Dwornikowski, Jacek Kobusiński, Michał Sajkowski, Piotr Sasak, Michał Szychowiak),
Chapter in SOA infrastructure tools: concepts and methods (Stanisław Ambroszkiewicz, Jerzy Brzezinski, Wojciech Cellary, Adam Grzech, Krzysztof Zieliński, eds.),
Poznań University of Economics Press, 2010, (ISBN 978-83-7417-544-9)
[bib]@INCOLLECTION {BBD+10,
author = {Bartosz Brodecki and Jerzy Brzeziński and Dariusz Dwornikowski and Jacek Kobusiński and Michał Sajkowski and Piotr Sasak and Michał Szychowiak},
title = {Selected aspects of management in {SOA}},
booktitle = {{SOA} infrastructure tools: concepts and methods},
publisher = {Poznań University of Economics Press},
year = {2010},
editor = {Stanisław Ambroszkiewicz and Jerzy Brzezinski and Wojciech Cellary and Adam Grzech and Krzysztof Zieliński},
note = {ISBN 978-83-7417-544-9}
}
[4]
Lightweight information flow control for web services (Bartosz Brodecki, Michał Kalewski, Piotr Sasak, Michał Szychowiak),
In Parallel Processing and Applied Mathematics (PPAM 2011) (Roman Wyrzykowski, Jack Dongarra, Konrad Karczewski, Jerzy Wasniewski, eds.),
Springer-Verlag, in Lecture Notes in Computer Science, volume 7204, 2012, pp. 608-617,
[doi][bib]@INPROCEEDINGS{BKS+11,
author = {Bartosz Brodecki and Michał Kalewski and Piotr Sasak and Michał Szychowiak},
title = {Lightweight information flow control for web services},
booktitle = {Parallel Processing and Applied Mathematics (PPAM 2011)},
series = {Lecture Notes in Computer Science},
year = {2012},
editor = {Wyrzykowski, Roman and Dongarra, Jack and Karczewski, Konrad and Wasniewski, Jerzy},
volume = {7204},
isbn = {978-3-642-31499-5},
keyword = {Computer Science},
pages = {608--617},
doi = {10.1007/978-3-642-31500-8_63},
address = {Toruń, Poland},
publisher = {Springer-Verlag},
abstract = {This paper presents a concept of incorporating information flow control (IFC) mechanisms into service-oriented systems. As opposed to existing IFC proposals, commonly imposing requirements hard or impossible to achieve in service-oriented environments (such as analysis of the application code), our solution fully complies with the Service Oriented Architecture (SOA) model. We present how IFC can be managed in an SOA system by using ORCA security policy language. We also describe two possible implementations of such SOA-specific IFC mechanisms using cryptographic keys and poly-instantiated web services.},
}
[5]
Consistency Maintenance of Modern Security Policies (Bartosz Brodecki, Jerzy Brzeziński, Piotr Sasak, Michał Szychowiak),
In Advanced Computing, Networking and Security (ADCONS 2011) (P. Santhi Thilagam, Alwyn Roshan Pais, K. Chandrasekaran, N. Balakrishnan, eds.),
Springer-Verlag, in Lecture Notes in Computer Science, volume 7135, 2012, pp. 472-477,
[doi][bib]@INPROCEEDINGS{BBS+11b,
author = {Bartosz Brodecki and Jerzy Brzeziński and Piotr Sasak and Michał Szychowiak},
title = {Consistency Maintenance of Modern Security Policies},
booktitle = {Advanced Computing, Networking and Security (ADCONS 2011)},
series = {Lecture Notes in Computer Science},
year = {2012},
volume = {7135},
editor = {P. Santhi Thilagam and Alwyn Roshan Pais and Chandrasekaran, K. and Balakrishnan, N.},
pages = {472--477},
address = {Mangalore, India},
publisher = {Springer-Verlag},
isbn = {978-3-642-29279-8},
doi = {10.1007/978-3-642-29280-4_55},
}
[6]
Modality conflict discovery for SOA security policies (Bartosz Brodecki, Jerzy Brzeziński, Piotr Sasak, Michał Szychowiak),
In Advanced Parallel Processing Technologies 2011 (APPT 2011) (Olivier Temam, Pen-Chung Yew, Binyu Zang, eds.),
Springer-Verlag, in Lecture Notes in Computer Science, volume 6965, 2011, pp. 112-126,
[pdf][doi][bib]@INPROCEEDINGS{BBS+11,
author = {Bartosz Brodecki and Jerzy Brzeziński and Piotr Sasak and Michał Szychowiak},
affiliation = {Poznań University of Technology, Piotrowo 2, 60-965 Poznań, Poland},
title = {Modality conflict discovery for SOA security policies},
booktitle = {Advanced Parallel Processing Technologies 2011 (APPT 2011)},
series = {Lecture Notes in Computer Science},
year = {2011},
volume = {6965},
editor = {Olivier Temam and Pen-Chung Yew and Binyu Zang},
pages = {112--126},
address = {Shanghai, China},
publisher = {Springer-Verlag},
doi = {10.1007/978-3-642-24151-2_9},
url = {http://www.springerlink.com/content/hq5g20882hu51761/},
isbn = {978-3-642-24150-5},
abstract = {This paper considers the problem of modality conflicts in security policies for Service-Oriented Architecture (SOA) environments. We describe the importance of this problem and present an algorithm for discovering modality conflicts with low overhead. Often being of large scale and compound structure, SOA systems can definitely benefit from that efficiency boost. Another advantage of the proposal over previously developed algorithms is its formal proof of correctness, also presented in this paper.},
}
[7]
Security Policy Definition Framework for SOA-based systems (Bartosz Brodecki, Piotr Sasak, Michał Szychowiak),
In 10th International Conference on Web Information Systems Engineering (WISE 2009) (Gottfried Vossen, Darrell D. E. Long, Jeffrey X. Yu, eds.),
Springer-Verlag, in Lecture Notes in Computer Science, volume 5802, 2009, pp. 589-596,
[pdf][doi][bib]@INPROCEEDINGS{BSS09,
author = {Bartosz Brodecki and Piotr Sasak and Michał Szychowiak},
title = {Security Policy Definition Framework for {SOA}-based systems},
booktitle = {10th International Conference on Web Information Systems Engineering (WISE 2009)},
year = {2009},
editor = {Gottfried Vossen and Darrell D. E. Long and Jeffrey X. Yu},
volume = {5802},
series = {Lecture Notes in Computer Science},
pages = {589--596},
address = {Poznań, Poland},
month = oct,
publisher = {Springer-Verlag},
abstract = {This paper presents an extended architecture of a policy definition framework fine-tuned for service-oriented environments conforming to the SOA distributed processing paradigm. We establish key requirements for such a framework, and use these to confront existing distributed policy frameworks. We also define a policy language destined to fulfill all recognized requirements and give a brief overview of its syntax.},
doi = {10.1007/978-3-642-04409-0_57},
url = {http://www.cs.put.poznan.pl/bbrodecki/publikacje/WISE2009_SecPol.pdf}
}
[8]
ModCon algorithm for discovering security policy conflicts (Bartosz Brodecki, Jerzy Brzeziński, Piotr Sasak, Michał Szychowiak),
In The 6th Joint Workshop on Information Security, 2011,
[pdf][bib]@INPROCEEDINGS{BBS+11a,
author = {Bartosz Brodecki and Jerzy Brzeziński and Piotr Sasak and Michał Szychowiak},
title = {{ModCon} algorithm for discovering security policy conflicts},
booktitle = {The 6th Joint Workshop on Information Security},
year = {2011},
address = {Kaohsiung, Taiwan},
abstract = {This paper considers the problem of modality conflicts in security policies for distributed environments. An universal and effective algorithm for discovering modality conflicts (ModCon) is proposed. The algorithm is compared with an ad-hoc approach for solving such conflicts, in order to demonstrate the attained efficiency gain.},
url = {http://www.cs.put.poznan.pl/bbrodecki/publikacje/JWIS.pdf},
owner = {Brodecki},
timestamp = {2011.09.09}
}
[9]
MAC kontra DAC, co wybrać - prezentacja (B. Brodecki, P. Sasak),
Pingwinaria conference,
Slide Show, 2007, (Pingwinaria conference)
[pdf][bib]@MISC{BS07b,
author = {B. Brodecki and P. Sasak},
title = {MAC kontra DAC, co wybrać - prezentacja},
howpublished = {Slide Show},
year = {2007},
note = {Pingwinaria conference},
timestamp = {2009.11.22},
url = {http://www.cs.put.poznan.pl/bbrodecki/publikacje/mac_kontra_dac.pdf}
}
[10]
MAC kontra DAC, co wybrać (B. Brodecki, P. Sasak),
Polish Linux Users Group, 2007, pp. 5f-6d, (ISBN 978-83-920463-5-6)
[pdf][bib]@CONFERENCE{BS07a,
author = {B. Brodecki and P. Sasak},
title = {MAC kontra DAC, co wybrać},
booktitle = {Pingwinaria conference},
year = {2007},
pages = {5f--6d},
organization = {Polish Linux Users Group},
publisher = {Polish Linux Users Group},
note = {ISBN 978-83-920463-5-6},
chapter = {MAC kontra DAC, co wybrać},
keywords = {Linux, MAC, DAC},
timestamp = {2009.11.22},
url = {http://www.cs.put.poznan.pl/bbrodecki/publikacje/mac_kontra_dac-artykul.pdf}
}
[11]
Obowiązkowa kontrola dostępu w systemie Linux (B. Brodecki, P. Sasak),
Confidence Conference, 2007, (Confidence Conference)
[pdf][bib]@MISC{BS07,
author = {B. Brodecki and P. Sasak},
title = {Obowiązkowa kontrola dostępu w systemie Linux},
year = {2007},
note = {Confidence Conference},
institution = CSPUT,
keywords = {MAC, DAC},
language = {polish},
organization = {Institute of Computing Science, Poznań University of Technology},
url = {http://www.cs.put.poznan.pl/bbrodecki/publikacje/confidence2007.pdf}
}