This paper addresses the making of security decisions, such as access-control decisions or spam filtering decisions, under uncertainty, when the benefit of doing so outweighs the need to absolutely guarantee these decisions are correct. For instance, when there are limited, costly, or failed communication channels to a policy-decision-point. Previously, local caching of decisions has been proposed, but when a correct decision is not available, either a policy-decision-point must be contacted, or a default decision used. We improve upon this model by using learned classifiers of access control decisions. These classifiers, trained on known decisions, infer decisions when an exact match has not been cached, and uses intuitive notions of utili...
Abstract Handling cyber threats unavoidably needs to deal with both uncertain and imprecise informat...
Acting under uncertainty is a fundamental challenge for any decision maker in the real world. As unc...
This dissertation considers a problem of online learning and online decision making where an agent o...
Summary The security of access and information flow carries with it the risk that resources will be ...
The need to ensure the primary functionality of any system means that considerations of security are...
This paper presents a novel access control framework reducing the access control problem to a tradit...
Traditional security and access control systems, such as MLS/Bell-LaPadula, RBAC are rigid and do no...
The purpose of this paper is to investigate security decision-making during risk and uncertain condi...
In traditional multi-level security systems, trust and risk values are pre-computed. Any change in t...
Supervised machine learning has been successfully used in the past to infer a system's security boun...
The principle of maximising the expected utility has had a large influence on agent-based decision s...
The predictability and understandability of the world around us is limited, and many events are unce...
In order for reinforcement learning techniques to be useful in real-world decision making processes,...
Abstract — Individuals in computer networks not only have to invest to secure their private resource...
The selection of the best countermeasures against cyber-attacks is an increasingly important topic. ...
Abstract Handling cyber threats unavoidably needs to deal with both uncertain and imprecise informat...
Acting under uncertainty is a fundamental challenge for any decision maker in the real world. As unc...
This dissertation considers a problem of online learning and online decision making where an agent o...
Summary The security of access and information flow carries with it the risk that resources will be ...
The need to ensure the primary functionality of any system means that considerations of security are...
This paper presents a novel access control framework reducing the access control problem to a tradit...
Traditional security and access control systems, such as MLS/Bell-LaPadula, RBAC are rigid and do no...
The purpose of this paper is to investigate security decision-making during risk and uncertain condi...
In traditional multi-level security systems, trust and risk values are pre-computed. Any change in t...
Supervised machine learning has been successfully used in the past to infer a system's security boun...
The principle of maximising the expected utility has had a large influence on agent-based decision s...
The predictability and understandability of the world around us is limited, and many events are unce...
In order for reinforcement learning techniques to be useful in real-world decision making processes,...
Abstract — Individuals in computer networks not only have to invest to secure their private resource...
The selection of the best countermeasures against cyber-attacks is an increasingly important topic. ...
Abstract Handling cyber threats unavoidably needs to deal with both uncertain and imprecise informat...
Acting under uncertainty is a fundamental challenge for any decision maker in the real world. As unc...
This dissertation considers a problem of online learning and online decision making where an agent o...