Biba model can protect information integrity but might deny various non-malicious access requests of the subjects, thereby decreasing the availability in the system. Therefore, a mechanism that allows exceptional access control is needed. Break the Glass (BTG) strategies refer an efficient means for extending the access rights of users in exceptional cases. These strategies help to prevent a system from stagnation. An approach is presented in this work for integrating Break the Glass strategies into the Biba model. This research proposes a model, BTG-Biba, which provides both an original Biba model used in normal situations and a mechanism used in emergency situations. The proposed model is context aware, can implement a fine-grained type o...
A building information model (BIM) is of upmost importance with a full life-time cycle in architectu...
Sharing of information is fundamental to modern computing environments across many application domai...
Copyright © 2015 Donghee Choi et al. This is an open access article distributed under the Creative C...
Biba model can protect information integrity but might deny various non-malicious access requests of...
Abstract—Access control models describe frameworks that dictate how subjects (e.g. users) access res...
Access control models describe frameworks that dictate how subjects (e.g. users) access resources. I...
Traditional access controls have evolved from being static and coarse-grained to being dynamic and v...
Checking the integrity of an application is necessary to determine if the latter will behave as expe...
The main feature of a secure information system is protecting sensitive data and services of an orga...
Abstract. Access control models provide an important means for the system-atic specification and man...
The request-response paradigm used for developing access control solutions commonly leads to point-t...
The request-response paradigm used for access control solutions commonly leads to point-to-point (PT...
Part 6: Availability, Security and PrivacyInternational audienceThe consequences of security breache...
The request-response paradigm used for access control solutions commonly leads to point-to-point (PT...
Robust technological enforcement of DRM licenses assumes that the prevention of direct access to the...
A building information model (BIM) is of upmost importance with a full life-time cycle in architectu...
Sharing of information is fundamental to modern computing environments across many application domai...
Copyright © 2015 Donghee Choi et al. This is an open access article distributed under the Creative C...
Biba model can protect information integrity but might deny various non-malicious access requests of...
Abstract—Access control models describe frameworks that dictate how subjects (e.g. users) access res...
Access control models describe frameworks that dictate how subjects (e.g. users) access resources. I...
Traditional access controls have evolved from being static and coarse-grained to being dynamic and v...
Checking the integrity of an application is necessary to determine if the latter will behave as expe...
The main feature of a secure information system is protecting sensitive data and services of an orga...
Abstract. Access control models provide an important means for the system-atic specification and man...
The request-response paradigm used for developing access control solutions commonly leads to point-t...
The request-response paradigm used for access control solutions commonly leads to point-to-point (PT...
Part 6: Availability, Security and PrivacyInternational audienceThe consequences of security breache...
The request-response paradigm used for access control solutions commonly leads to point-to-point (PT...
Robust technological enforcement of DRM licenses assumes that the prevention of direct access to the...
A building information model (BIM) is of upmost importance with a full life-time cycle in architectu...
Sharing of information is fundamental to modern computing environments across many application domai...
Copyright © 2015 Donghee Choi et al. This is an open access article distributed under the Creative C...