Proceedings of the 12th International Conference on Security and Cryptography 2015
DOI: 10.5220/0005577304540459
|View full text |Cite
|
Sign up to set email alerts
|

A Risk Awareness Approach for Monitoring the Compliance of RBAC-based Policies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
3
1

Relationship

3
4

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 15 publications
0
6
0
Order By: Relevance
“…This process is iterative in the sense that the modifications introduced by the security architect must be checked until no anomaly is detected. Our risk assessment approach aims to measure the distance of evolution, in terms of risk, between two instances of a security policy [70]. We focused when defining our approach on how to help the security architect to quantify that risk.…”
Section: Formal Validation Of the Conformity Of Rbac Policiesmentioning
confidence: 99%
“…This process is iterative in the sense that the modifications introduced by the security architect must be checked until no anomaly is detected. Our risk assessment approach aims to measure the distance of evolution, in terms of risk, between two instances of a security policy [70]. We focused when defining our approach on how to help the security architect to quantify that risk.…”
Section: Formal Validation Of the Conformity Of Rbac Policiesmentioning
confidence: 99%
“…Visibly, they were considering that the access control policy was reliable and valid. Thus policies are in fact exposed to various threats and the literature provides very little works that address the technical problems derived from the implementation of the access control policy [1].…”
Section: The Problem Statementmentioning
confidence: 99%
“…That treatment plan precise the different actions to be taken, the persons responsible of applying the plan, the resource requirements, the performance measures and constraints, the reporting and monitoring requirements and the timing and schedule. [1] The concrete process of our risk approach related to our framework is shown in the following (figure 2)  design of an intrusion detection system for unauthorized update of access control policy  detection of induced faults by establishing a correlation between the detected anomalies  list of the recurrent targeted and sensitive data  detection and establishment of the intrusive user behavior and thus, reinforcement of the Intrusion Detection Systems  production of a global and comprehensive system for risk management for access control systems…”
Section: Fig 1 : a Framework For Risk Managementmentioning
confidence: 99%
See 2 more Smart Citations