Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Pierre Konopacki is active.

Publication


Featured researches published by Pierre Konopacki.


international conference on engineering of complex computer systems | 2012

A Design by Contract Approach to Verify Access Control Policies

Hakim Ferrier-Belhaouari; Pierre Konopacki; Régine Laleau; Marc Frappier

In the security domain, access control (AC) consists in specifying who can access to what and how, with the four well-known concepts of permission, prohibition, obligation and separation of duty. In this paper, we focus on role-based access control (RBAC) models and more precisely on the verification of formal RBAC models. We propose a solution for this verification issue, based on the use of the Tamago platform. In Tamago, functional contracts can be defined with pre/post conditions and deterministic automata. The Tamago platform provides tools for static verifications of these contracts, generation of test scenarios from the abstract contracts and monitoring facilities for dynamic analyses. We have extended the platform to take into account AC aspects. AC rules, expressed in a subset of EB3SEC, a process algebra-based language, are translated into pre and post conditions of new security contracts. We have also adapted the test case generator to derive suitable test scenarios and the monitoring framework by adding a new security component.


conference on advanced information systems engineering | 2011

Expressing Access Control Policies with an Event-Based Approach

Pierre Konopacki; Marc Frappier; Régine Laleau

Information systems are widely used and help in the management of huge quantities of data. Generally, these data are valuable or sensitive, their access must be restricted to granted users. Security is a mandatory requirement for information systems. Several methods already exist to express access control policies, but few of them support all kinds of constraints that can be defined in access control policies. In this paper, we present EB 3 SEC, a language used to formally model and interpret access control policies in information systems. Permissions, prohibitions and static separation of duty are specified by a class diagram. As EB 3 SEC includes a process algebra, dynamic access control constraints such as obligations and dynamic separation of duty can be easily expressed. Finally, we present the architecture of the tool used to interpret EB 3 SEC models.


foundations and practice of security | 2011

Specification and verification of access control policies in EB 3 SEC: work in progress

Pierre Konopacki; Hakim Belhaouari; Marc Frappier; Régine Laleau

Information systems are widely used and help in the management of huge quantities of data. Generally, these data are valuable or sensitive, their access must be restricted to granted users. Security is a mandatory requirement for information systems. Several methods already exist to express access control policies, but few of them, like eb3sec, support all kinds of constraints that can be defined in access control policies. In this paper, we present how to use eb3sec to express two kinds of access control constraints : permissions and prohibitions. Once, constraints are expressed, we provide algorithms to verify that the model of the policy do not lead to deadlock.


international conference on enterprise information systems | 2010

MODEL-DRIVEN ENGINEERING OF FUNCTIONAL SECURITY POLICIES

Marc Frappier; Frédéric Gervais; Pierre Konopacki; Régine Laleau; Jérémy Milhau; Richard St-Denis


Archive | 2012

Une approche evenementielle pour la description de politiques de controle d'acces

Marc Frappier; Pierre Konopacki


Ingénierie Des Systèmes D'information | 2010

Modélisation de politiques de sécurité à l'aide d'une algèbre de processus: Présentation de la méthode EB3SEC

Pierre Konopacki; Marc Frappier; Régine Laleau


INFORSID | 2009

Modélisation de politiques de sécurité à l'aide d'une algèbre de processus.

Pierre Konopacki; Marc Frappier; Régine Laleau


International Workshop on Model-Based and Policy-Based Engineering in Information Security | 2018

A FOUR-CONCERN-ORIENTED SECURE IS DEVELOPMENT APPROACH

Marc Frappier; Frédéric Gervais; Pierre Konopacki; Régine Laleau; Jérémy Milhau; Richard St-Denis


international conference on security and cryptography | 2011

A four-concern-oriented secure is development approach

Marc Frappier; Frédéric Gervais; Pierre Konopacki; Régine Laleau; Jérémy Milhau; Richard St-Denis


Revue des Sciences et Technologies de l'Information - Série ISI : Ingénierie des Systèmes d'Information | 2009

Modélisation de politiques de sécurité à l'aide d'une algèbre de processus

Pierre Konopacki; Marc Frappier; Régine Laleau

Collaboration


Dive into the Pierre Konopacki's collaboration.

Top Co-Authors

Avatar

Marc Frappier

Université de Sherbrooke

View shared research outputs
Top Co-Authors

Avatar

Régine Laleau

Université de Sherbrooke

View shared research outputs
Top Co-Authors

Avatar

Jérémy Milhau

Université de Sherbrooke

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Régine Laleau

Université de Sherbrooke

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge