Proceedings of the 17th ACM Symposium on Access Control Models and Technologies 2012
DOI: 10.1145/2295136.2295168
|View full text |Cite
|
Sign up to set email alerts
|

A trust-and-risk aware RBAC framework

Abstract: Insider Attacks are one of the most dangerous threats organizations face today. An insider attack occurs when a person authorized to perform certain actions in an organization decides to abuse the trust, and harm the organization. These attacks may negatively impact the reputation of the organization, its productivity, and may produce losses in revenue and clients. Avoiding insider attacks is a daunting task. While it is necessary to provide privileges to employees so they can perform their jobs efficiently, p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
18
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 38 publications
(18 citation statements)
references
References 28 publications
0
18
0
Order By: Relevance
“…Crampton & Huth [31] discuss the limitation of detecting insiders using access control techniques, they emphasised the insufficiency of relying only on static access and predefined access rules, and they show the press need for considering the context in the access rules. Also we recommend investigating dynamic access control approaches such as Attribute-Base Access Control (ABAC), Risk based adaptive access control [32], and Trust based access control [33]. However, these approaches need be adopted for cloud environments.…”
Section: Future Research Directionsmentioning
confidence: 99%
“…Crampton & Huth [31] discuss the limitation of detecting insiders using access control techniques, they emphasised the insufficiency of relying only on static access and predefined access rules, and they show the press need for considering the context in the access rules. Also we recommend investigating dynamic access control approaches such as Attribute-Base Access Control (ABAC), Risk based adaptive access control [32], and Trust based access control [33]. However, these approaches need be adopted for cloud environments.…”
Section: Future Research Directionsmentioning
confidence: 99%
“…The model we propose is not only focused on information sharing and covers more aspects of risk management. Baracaldo and Joshi [16] extend the role-based access control model with risk and trust management in order to prevent insider threats that are caused by internal, legitimate users. They evaluate all the risk parameters statically, while in our model risk is estimated dynamically in real-time at request time.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, researchers have proposed the notion of risk-adaptable access control models [9,14,13] and trust-based access control models [7,4,23] to facilitate dynamic adaptation of access control policies based on operational needs and situational awareness. A recent work [1] combines these two philosophies into one comprehensive model. However, none of these works address the problem of delegation in mobile cloud systems.…”
Section: Related Workmentioning
confidence: 99%