The increasing need to share information in dynamic environments has created a requirement for risk-aware access control systems. In this paper, we present a metamodel for risk-aware authorization that captures the key aspects of a system in relation to risk mitigation. In particular, we develop various risk-aware models as instances of the metamodel that broadly differ in the form of risk mitigation that is used (system obligations and user obligations respectively), and study how those obligations are applied to reduce and account for the risk incurred by granting access. Unlike system obligations, an access control system cannot guarantee that user obligations are fulfilled. We propose two approaches to defining risk-aware authorization ...
In dynamic and risk-prone environments, security rules should be flexible enough to permit the treat...
Risk assessment and access control are important issues in cloud computing. In this paper, we propos...
Abstract. Role Based Access Control (RBAC) has received consider-able attention as a model of choice...
The increasing need to share information in dynamic environments has created a requirement for risk-...
The increasing need to share information in dynamic environments has created a requirement for risk-...
Abstract—Over the years, role based access control (RBAC) has remained a dominant form of access con...
We describe a framework for risk assessment specifically within the context of risk-based access con...
In traditional multi-level security systems, trust and risk values are pre-computed. Any change in t...
Context-based access control is an emerging approach for modeling adaptive solution, making access c...
We present a refined model for Role Based Access Control policies and define a risk measure for the ...
Traditional security policies largely focus on access control requirements, which specify who can ac...
This paper presents adaptive access control for areas where risks require modifying authorizations d...
In monitored environments, where risks can be prevented via sensors and spatial data technologies, s...
Systems for allowing users to manage access to their personal data are important for a wide variety ...
Email\ud Print\ud Request Permissions\ud Systems for allowing users to manage access to their person...
In dynamic and risk-prone environments, security rules should be flexible enough to permit the treat...
Risk assessment and access control are important issues in cloud computing. In this paper, we propos...
Abstract. Role Based Access Control (RBAC) has received consider-able attention as a model of choice...
The increasing need to share information in dynamic environments has created a requirement for risk-...
The increasing need to share information in dynamic environments has created a requirement for risk-...
Abstract—Over the years, role based access control (RBAC) has remained a dominant form of access con...
We describe a framework for risk assessment specifically within the context of risk-based access con...
In traditional multi-level security systems, trust and risk values are pre-computed. Any change in t...
Context-based access control is an emerging approach for modeling adaptive solution, making access c...
We present a refined model for Role Based Access Control policies and define a risk measure for the ...
Traditional security policies largely focus on access control requirements, which specify who can ac...
This paper presents adaptive access control for areas where risks require modifying authorizations d...
In monitored environments, where risks can be prevented via sensors and spatial data technologies, s...
Systems for allowing users to manage access to their personal data are important for a wide variety ...
Email\ud Print\ud Request Permissions\ud Systems for allowing users to manage access to their person...
In dynamic and risk-prone environments, security rules should be flexible enough to permit the treat...
Risk assessment and access control are important issues in cloud computing. In this paper, we propos...
Abstract. Role Based Access Control (RBAC) has received consider-able attention as a model of choice...