2012
DOI: 10.1007/978-3-642-30436-1_16
|View full text |Cite
|
Sign up to set email alerts
|

A Framework for Threat Assessment in Access Control Systems

Abstract: Abstract. We describe a framework for threat assessment specifically within the context of access control systems, where subjects request access to resources for which they may not be pre-authorized. The framework that we describe includes four different approaches for conducting threat assessment: an object sensitivity-based approach, a subject trustworthiness-based approach and two additional approaches which are based on the difference between object sensitivity and subject trustworthiness. We motivate each… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…Authors in [18] proceed as in [6]. The difference is just that while the late decide to allow access only and only if the trustworthiness is more than the clearance, in [18] authors treat the problem of unauthorized access by identifying different cases : they consider the level of the object sensitivity score compared to that of the subject trustworthiness score and vice versa.…”
Section: The State-of-the Artmentioning
confidence: 99%
“…Authors in [18] proceed as in [6]. The difference is just that while the late decide to allow access only and only if the trustworthiness is more than the clearance, in [18] authors treat the problem of unauthorized access by identifying different cases : they consider the level of the object sensitivity score compared to that of the subject trustworthiness score and vice versa.…”
Section: The State-of-the Artmentioning
confidence: 99%