Web-based collaboration provides a platform which allows users from different domains to share and access information. In such an environment, mitigating threats from insider attacks is challenging, particularly if state-of-the-art token-based access control is used to authorize (permit or deny) requests. This entails the need for an additional layer of authorization based on soft-security factors such as the reputation of the requesters, risks involved in requests, and so on to make the final decision. In this paper, we propose a novel risk quantification framework, called R2Q, which exploits a weighted regression approach to compute the expected threat related to a collaboration request. Our model combines the shared object\u27s sensitivi...
Role Based Access Control (RBAC) has been introduced in an effort to facilitate authorization in dat...
With development of grid technology, sensitive data protection becomes a difficult task for accesses...
Abstract — Building a good cooperation in the P2P resource sharing is a fundamental and challenging ...
We describe a framework for risk assessment specifically within the context of risk-based access con...
Abstract—Over the years, role based access control (RBAC) has remained a dominant form of access con...
Insider Attacks are one of the most dangerous threats organizations face today. An insider attack oc...
Web 2.0 applications are continuously moving into the corporate mainstream. Each new development bri...
Insider Attacks are one of the most dangerous threats or-\ud ganizations face today. An insider atta...
Insider Attacks are one of the most dangerous threats organizations face today. An insider attack oc...
The trusting peer in order to determine the likelihood of the loss in its resources might analyze th...
While making an interaction-based decision in the domain of e-commerce business interactions, it is ...
Abstract—Service-oriented computing promotes collaboration by defining the standards layer that allo...
In almost every interaction the trusting peer might fear about the likelihood of the loss in the res...
Email\ud Print\ud Request Permissions\ud Systems for allowing users to manage access to their person...
As e-commerce always suffers from the uncertainty, cheats and attacks, concepts of trust and risk ar...
Role Based Access Control (RBAC) has been introduced in an effort to facilitate authorization in dat...
With development of grid technology, sensitive data protection becomes a difficult task for accesses...
Abstract — Building a good cooperation in the P2P resource sharing is a fundamental and challenging ...
We describe a framework for risk assessment specifically within the context of risk-based access con...
Abstract—Over the years, role based access control (RBAC) has remained a dominant form of access con...
Insider Attacks are one of the most dangerous threats organizations face today. An insider attack oc...
Web 2.0 applications are continuously moving into the corporate mainstream. Each new development bri...
Insider Attacks are one of the most dangerous threats or-\ud ganizations face today. An insider atta...
Insider Attacks are one of the most dangerous threats organizations face today. An insider attack oc...
The trusting peer in order to determine the likelihood of the loss in its resources might analyze th...
While making an interaction-based decision in the domain of e-commerce business interactions, it is ...
Abstract—Service-oriented computing promotes collaboration by defining the standards layer that allo...
In almost every interaction the trusting peer might fear about the likelihood of the loss in the res...
Email\ud Print\ud Request Permissions\ud Systems for allowing users to manage access to their person...
As e-commerce always suffers from the uncertainty, cheats and attacks, concepts of trust and risk ar...
Role Based Access Control (RBAC) has been introduced in an effort to facilitate authorization in dat...
With development of grid technology, sensitive data protection becomes a difficult task for accesses...
Abstract — Building a good cooperation in the P2P resource sharing is a fundamental and challenging ...