%PDF-1.4 % 1 0 obj << /S /GoTo /D (section.1) >> endobj 4 0 obj (Introduction) endobj 5 0 obj << /S /GoTo /D (section.2) >> endobj 8 0 obj (Background) endobj 9 0 obj << /S /GoTo /D (subsection.2.1) >> endobj 12 0 obj (Access Control) endobj 13 0 obj << /S /GoTo /D (subsection.2.2) >> endobj 16 0 obj (Delegation) endobj 17 0 obj << /S /GoTo /D (subsection.2.3) >> endobj 20 0 obj (Security-Driven Model-Based Dynamic Adaptation) endobj 21 0 obj << /S /GoTo /D (section.3) >> endobj 24 0 obj (A Running Example) endobj 25 0 obj << /S /GoTo /D (section.4) >> endobj 28 0 obj (A Model-Driven Approach For Adaptive Delegation) endobj 29 0 obj << /S /GoTo /D (subsection.4.1) >> endobj 32 0 obj (Overview of our approach) endobj 33 0 obj << /S /GoTo /D (subsection.4.2) >> endobj 36 0 obj (Delegation metamodel ) endobj 37 0 obj << /S /GoTo /D (subsection.4.3) >> endobj 40 0 obj (Transformations/Compositions) endobj 41 0 obj << /S /GoTo /D (subsubsection.4.3.1) >> endobj 44 0 obj (Adapting RBAC policy model to reflect delegation ) endobj 45 0 obj << /S /GoTo /D (subsubsection.4.3.2) >> endobj 48 0 obj (Transformation of Security Policy to Component-based Architecture) endobj 49 0 obj << /S /GoTo /D (subsubsection.4.3.3) >> endobj 52 0 obj (An alternative way: using only one transformation ) endobj 53 0 obj << /S /GoTo /D (subsection.4.4) >> endobj 56 0 obj (Adaptation and Evolution strategies) endobj 57 0 obj << /S /GoTo /D (subsubsection.4.4.1) >> endobj 60 0 obj (Adaptation) endobj 61 0 obj << /S /GoTo /D (subsubsection.4.4.2) >> endobj 64 0 obj (Evolution) endobj 65 0 obj << /S /GoTo /D (section.5) >> endobj 68 0 obj (Evaluation) endobj 69 0 obj << /S /GoTo /D (section.6) >> endobj 72 0 obj (Related Work) endobj 73 0 obj << /S /GoTo /D (section.7) >> endobj 76 0 obj (Conclusion and Future Work) endobj 77 0 obj << /S /GoTo /D (section.8) >> endobj 80 0 obj (References) endobj 81 0 obj << /S /GoTo /D [82 0 R /Fit] >> endobj 87 0 obj << /Length 5517 /Filter /FlateDecode >> stream xڍ;rFX2}켬m1aMB,вͳP $UYYWޙWwo}LUyE櫻U^G,I$Vw}u~h?fff_^zxձ:}ݜ7}crH1I-ߏ2VA!n4"[m#Õgǿ?ϛ_WU[vv~kq÷tmD[g͵:>QMw0T^Ôv{QŲ}nW_-}u[}vV+<ɺa:-Ts}f{pе?ow5o^yQ>7[1J. xGd7Csퟄu<;K$#s/̮?V{ 3Dm%x<5;$MDT.|<ɳٝ x3S!^v/Rֻ-Gh!9 eV^܌T3gM*.Nۂ9Q9l~~4R34d-D@W&{f<<vwz:3vʕܪGn|ٹEX^+{EUuҿxܨԣo?[?aE#ynі_@ZֵǝUFm#*~%mEǜ۫?qyA"D|Ub8_#`nb lĠG3r8dp`Ԗ?*ڹ6CD9XFxyJl3 Vz[;7%C,"dNzu'i"o8OdCNptE2qGOU(#z"KRaL7:`Dh3?p_]VuzA427KvƖA43ދ,XLƔ#bWK:iFԶPs'BIJzgZ:-B{q3Y:Qgǜ^Ȅm?8POmQ"8yda_?S+^cpɴmIIVOL,؛ccGƱiU@HWC$A_v3hQ\_ '}]4ڜ =;U,ox:iYY&Jju P><}h^ahaCǥEtaVXf11s-ܙc?ӄyh14ʬ