Risk assessment and access control are important issues in cloud computing. In this paper, we propose a formal approach to risk assessment for RBAC Systems, in which access control decisions are taken after consideration of risk assessment. The risk assessment method considers partial orderings on objects and actions, which allow us to effectively capture the notions of importance of objects and criticality of actions and then to determine the risk of assigning a specific role to a specific user. We in particular consider the cases of permission assignment and delegation assignment
Current proposals for access control languages cannot specify policies required by specific applicat...
The Cloud Service which is provided generates access to the present resources by service level agree...
We present a refined model for Role Based Access Control policies and define a risk measure for the ...
The increasing need to share information in dynamic environments has created a requirement for risk-...
Abstract—Over the years, role based access control (RBAC) has remained a dominant form of access con...
International audienceWe propose a framework to evaluate the risk incurred when managing users and p...
Role Based Access Control (RBAC) has been introduced in an effort to facilitate authorization in dat...
We describe a framework for risk assessment specifically within the context of risk-based access con...
Abstract. Role Based Access Control (RBAC) has received consider-able attention as a model of choice...
Context-based access control is an emerging approach for modeling adaptive solution, making access c...
Traditional security and access control systems, such as MLS/Bell-LaPadula, RBAC are rigid and do no...
The increasing need to share information in dynamic environments has created a requirement for risk-...
Cloud service providers offer access to their resources through formal service level agreements (SLA...
Insider Attacks are one of the most dangerous threats organizations face today. An insider attack oc...
Insider Attacks are one of the most dangerous threats or-\ud ganizations face today. An insider atta...
Current proposals for access control languages cannot specify policies required by specific applicat...
The Cloud Service which is provided generates access to the present resources by service level agree...
We present a refined model for Role Based Access Control policies and define a risk measure for the ...
The increasing need to share information in dynamic environments has created a requirement for risk-...
Abstract—Over the years, role based access control (RBAC) has remained a dominant form of access con...
International audienceWe propose a framework to evaluate the risk incurred when managing users and p...
Role Based Access Control (RBAC) has been introduced in an effort to facilitate authorization in dat...
We describe a framework for risk assessment specifically within the context of risk-based access con...
Abstract. Role Based Access Control (RBAC) has received consider-able attention as a model of choice...
Context-based access control is an emerging approach for modeling adaptive solution, making access c...
Traditional security and access control systems, such as MLS/Bell-LaPadula, RBAC are rigid and do no...
The increasing need to share information in dynamic environments has created a requirement for risk-...
Cloud service providers offer access to their resources through formal service level agreements (SLA...
Insider Attacks are one of the most dangerous threats organizations face today. An insider attack oc...
Insider Attacks are one of the most dangerous threats or-\ud ganizations face today. An insider atta...
Current proposals for access control languages cannot specify policies required by specific applicat...
The Cloud Service which is provided generates access to the present resources by service level agree...
We present a refined model for Role Based Access Control policies and define a risk measure for the ...