The increasing need to share information in dynamic environments has created a requirement for risk-aware access control systems. The standard RBAC model is designed to operate in a relatively stable, closed environment and does not include any support for risk. In this paper, we explore a number of ways in which the RBAC model can be extended to incorporate notions of risk. In particular, we develop three simple risk-aware RBAC models that differ in the way in which risk is represented and accounted for in making access control decisions. We also propose a risk-aware RBAC model that combines all the features of three simple models and consider some issues related to its implementation. Compared with existing work, our models have clear aut...
The administration of large Role-Based Access Control (RBAC) systems is a challenging problem. In or...
Systems for allowing users to manage access to their personal data are important for a wide variety ...
Insider Attacks are one of the most dangerous threats organizations face today. An insider attack oc...
Abstract—Over the years, role based access control (RBAC) has remained a dominant form of access con...
Abstract. Role Based Access Control (RBAC) has received consider-able attention as a model of choice...
The increasing need to share information in dynamic environments has created a requirement for risk-...
Role Based Access Control (RBAC) has been introduced in an effort to facilitate authorization in dat...
Risk assessment and access control are important issues in cloud computing. In this paper, we propos...
International audienceWe propose a framework to evaluate the risk incurred when managing users and p...
We present a refined model for Role Based Access Control policies and define a risk measure for the ...
Context-based access control is an emerging approach for modeling adaptive solution, making access c...
Current proposals for access control languages cannot specify policies required by specific applicat...
Traditional security and access control systems, such as MLS/Bell-LaPadula, RBAC are rigid and do no...
The basic concept of role-based access control (RBAC) is that permissions are associated with roles,...
In traditional multi-level security systems, trust and risk values are pre-computed. Any change in t...
The administration of large Role-Based Access Control (RBAC) systems is a challenging problem. In or...
Systems for allowing users to manage access to their personal data are important for a wide variety ...
Insider Attacks are one of the most dangerous threats organizations face today. An insider attack oc...
Abstract—Over the years, role based access control (RBAC) has remained a dominant form of access con...
Abstract. Role Based Access Control (RBAC) has received consider-able attention as a model of choice...
The increasing need to share information in dynamic environments has created a requirement for risk-...
Role Based Access Control (RBAC) has been introduced in an effort to facilitate authorization in dat...
Risk assessment and access control are important issues in cloud computing. In this paper, we propos...
International audienceWe propose a framework to evaluate the risk incurred when managing users and p...
We present a refined model for Role Based Access Control policies and define a risk measure for the ...
Context-based access control is an emerging approach for modeling adaptive solution, making access c...
Current proposals for access control languages cannot specify policies required by specific applicat...
Traditional security and access control systems, such as MLS/Bell-LaPadula, RBAC are rigid and do no...
The basic concept of role-based access control (RBAC) is that permissions are associated with roles,...
In traditional multi-level security systems, trust and risk values are pre-computed. Any change in t...
The administration of large Role-Based Access Control (RBAC) systems is a challenging problem. In or...
Systems for allowing users to manage access to their personal data are important for a wide variety ...
Insider Attacks are one of the most dangerous threats organizations face today. An insider attack oc...