In traditional multi-level security systems, trust and risk values are pre-computed. Any change in these values requires manual intervention of an administrator. In many dynamic environments, however, these values should be auto-adaptive, and auto-tunable according to the usage history of the users. Moreover, occasional exceptions on resource needs, which are common in dynamic environments like healthcare, should be allowed if the subjects show a positive record of use toward resources they acquired in the past. Conversely, access of authorized users, who have negative record, should be restricted. These requirements are not taken into consideration in existing risk-based access control systems. In order to overcome these shortcomings and t...
In dynamic and risk-prone environments, security rules should be flexible enough to permit the treat...
We investigate the cost of changing access control policies dynamically as a response action in comp...
In dynamic and uncertain environments such as healthcare, where the needs of security and informatio...
Traditional security and access control systems, such as MLS/Bell-LaPadula, RBAC are rigid and do no...
Abstract—Over the years, role based access control (RBAC) has remained a dominant form of access con...
Risk-based access control systems are a new element in access control categories, incorporating risk...
Context-based access control is an emerging approach for modeling adaptive solution, making access c...
The increasing need to share information in dynamic environments has created a requirement for risk-...
The increasing need to share information in dynamic environments has created a requirement for risk-...
We describe a framework for risk assessment specifically within the context of risk-based access con...
In monitored environments, where risks can be prevented via sensors and spatial data technologies, s...
Access control (AC) refers to mechanisms and policies that restrict access to resources, thus regula...
This paper presents adaptive access control for areas where risks require modifying authorizations d...
Abstract. The functioning of modern IT-systems with autonomously acting components requires an elabo...
Traditional access controls have evolved from being static and coarse-grained to being dynamic and v...
In dynamic and risk-prone environments, security rules should be flexible enough to permit the treat...
We investigate the cost of changing access control policies dynamically as a response action in comp...
In dynamic and uncertain environments such as healthcare, where the needs of security and informatio...
Traditional security and access control systems, such as MLS/Bell-LaPadula, RBAC are rigid and do no...
Abstract—Over the years, role based access control (RBAC) has remained a dominant form of access con...
Risk-based access control systems are a new element in access control categories, incorporating risk...
Context-based access control is an emerging approach for modeling adaptive solution, making access c...
The increasing need to share information in dynamic environments has created a requirement for risk-...
The increasing need to share information in dynamic environments has created a requirement for risk-...
We describe a framework for risk assessment specifically within the context of risk-based access con...
In monitored environments, where risks can be prevented via sensors and spatial data technologies, s...
Access control (AC) refers to mechanisms and policies that restrict access to resources, thus regula...
This paper presents adaptive access control for areas where risks require modifying authorizations d...
Abstract. The functioning of modern IT-systems with autonomously acting components requires an elabo...
Traditional access controls have evolved from being static and coarse-grained to being dynamic and v...
In dynamic and risk-prone environments, security rules should be flexible enough to permit the treat...
We investigate the cost of changing access control policies dynamically as a response action in comp...
In dynamic and uncertain environments such as healthcare, where the needs of security and informatio...