Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. But in the ubiquitous environment, this approach is not enough for many emerging security vulnerabilities. Thus, improving current access control mechanisms is still necessary. Risk is an effective tool used for decision-making in economics. In this paper, we design a new model for risk assessment in ubiquitous environment and use risk as a key component in decision-making process in our access control model. This solution makes access control management more dynamic and precise
Risk assessment and access control are important issues in cloud computing. In this paper, we propos...
Since the access control environment has changed and the threat of insider information leakage has c...
Copyright © 2015 Donghee Choi et al. This is an open access article distributed under the Creative C...
We describe a framework for risk assessment specifically within the context of risk-based access con...
In monitored environments, where risks can be prevented via sensors and spatial data technologies, s...
The increasing need to share information in dynamic environments has created a requirement for risk-...
Abstract—Over the years, role based access control (RBAC) has remained a dominant form of access con...
In dynamic and risk-prone environments, security rules should be flexible enough to permit the treat...
Traditional security and access control systems, such as MLS/Bell-LaPadula, RBAC are rigid and do no...
In traditional multi-level security systems, trust and risk values are pre-computed. Any change in t...
Ubiquitous Computing (UbiComp) environments. CRAAC is designed to augment flexibility and generalit...
The increasing need to share information in dynamic environments has created a requirement for risk-...
This paper presents adaptive access control for areas where risks require modifying authorizations d...
Qualitative security policy design methods suffer from over-reliance on expertise. This paper presen...
Summary The security of access and information flow carries with it the risk that resources will be ...
Risk assessment and access control are important issues in cloud computing. In this paper, we propos...
Since the access control environment has changed and the threat of insider information leakage has c...
Copyright © 2015 Donghee Choi et al. This is an open access article distributed under the Creative C...
We describe a framework for risk assessment specifically within the context of risk-based access con...
In monitored environments, where risks can be prevented via sensors and spatial data technologies, s...
The increasing need to share information in dynamic environments has created a requirement for risk-...
Abstract—Over the years, role based access control (RBAC) has remained a dominant form of access con...
In dynamic and risk-prone environments, security rules should be flexible enough to permit the treat...
Traditional security and access control systems, such as MLS/Bell-LaPadula, RBAC are rigid and do no...
In traditional multi-level security systems, trust and risk values are pre-computed. Any change in t...
Ubiquitous Computing (UbiComp) environments. CRAAC is designed to augment flexibility and generalit...
The increasing need to share information in dynamic environments has created a requirement for risk-...
This paper presents adaptive access control for areas where risks require modifying authorizations d...
Qualitative security policy design methods suffer from over-reliance on expertise. This paper presen...
Summary The security of access and information flow carries with it the risk that resources will be ...
Risk assessment and access control are important issues in cloud computing. In this paper, we propos...
Since the access control environment has changed and the threat of insider information leakage has c...
Copyright © 2015 Donghee Choi et al. This is an open access article distributed under the Creative C...