2012
DOI: 10.1016/j.cose.2012.02.006
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic risk-based decision methods for access control systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
35
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 58 publications
(35 citation statements)
references
References 8 publications
0
35
0
Order By: Relevance
“…Throughout their paper, they proposed successful instances of their proposal. Shaikh et al [18] proposed two methods of risk aware access control based on trust and risk. The formulation of trust and risk depends on rewards and penalties which are updated either positively (rewards) or negatively (penalties) after an access request decision is made (allow or deny, respectively).…”
Section: Related Workmentioning
confidence: 99%
“…Throughout their paper, they proposed successful instances of their proposal. Shaikh et al [18] proposed two methods of risk aware access control based on trust and risk. The formulation of trust and risk depends on rewards and penalties which are updated either positively (rewards) or negatively (penalties) after an access request decision is made (allow or deny, respectively).…”
Section: Related Workmentioning
confidence: 99%
“…To augment the existing access control schemes with risk awareness, dynamic Risk-based decision methods which add trust value and risk value to access control decision point such that it becomes dynamic with the 'history of use' recorded for each user is proposed in [20]. When access is granted, the formula is consulted to add reward or penalty points to the user which will further assess in making future access decisions.…”
Section: Risk-aware Access Control Modelsmentioning
confidence: 99%
“…Features that can be taken into account in dynamic access control models can include risk, need, benefit, trust and context. The dynamic nature of the access control is implemented in these models because access decisions vary according to contextual information and features that are evaluated at the time of the access request [31], [32].…”
Section: Access Control In the Iotmentioning
confidence: 99%