2011 6th International Conference on Risks and Security of Internet and Systems (CRiSIS) 2011
DOI: 10.1109/crisis.2011.6061833
|View full text |Cite
|
Sign up to set email alerts
|

Cost-effective enforcement of UCON<inf>A</inf> policies

Abstract: In Usage CONtrol (UCON) access decisions rely on mutable attributes. A reference monitor should re-evaluate security policies each time when attributes change their values. Catching timely all attribute changes is a challenging issue, especially if the attribute provider and the reference monitor reside in different security domains. Some attribute changes might be missed, corrupted, and delayed. As a result, the reference monitor may erroneously grant the access to malicious users and forbid it for eligible u… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 14 publications
0
1
0
Order By: Relevance
“…This material is briefly presented in the Appendix. Our work [18] focuses on the cost-effective enforcement of access control under uncertainties. This paper extends the part on access control and adds the part on the costeffective enforcement of usage control.…”
Section: Related Workmentioning
confidence: 99%
“…This material is briefly presented in the Appendix. Our work [18] focuses on the cost-effective enforcement of access control under uncertainties. This paper extends the part on access control and adds the part on the costeffective enforcement of usage control.…”
Section: Related Workmentioning
confidence: 99%