2007 IEEE Symposium on Security and Privacy (SP '07) 2007
DOI: 10.1109/sp.2007.21
|View full text |Cite
|
Sign up to set email alerts
|

Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
233
0

Year Published

2008
2008
2013
2013

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 233 publications
(233 citation statements)
references
References 7 publications
0
233
0
Order By: Relevance
“…To some extent, the notion of cost security policy defines a threshold characterizing the maximal/minimal cost reachable, while taking the probability of reaching this threshold into account. Such a notion of threshold is also used by Cheng et al, where accesses are associated with a level of risk, and decisions are made according to some predefined risk thresholds, without detailing how such policies can be enforced at runtime [7]. In the context of runtime enforcement, Bielova and Massacci propose to apply a distance metrics to capture the similarity between traces [2], and we could consider the cost required to obtain one trace from another as a distance metrics.…”
Section: Related Workmentioning
confidence: 99%
“…To some extent, the notion of cost security policy defines a threshold characterizing the maximal/minimal cost reachable, while taking the probability of reaching this threshold into account. Such a notion of threshold is also used by Cheng et al, where accesses are associated with a level of risk, and decisions are made according to some predefined risk thresholds, without detailing how such policies can be enforced at runtime [7]. In the context of runtime enforcement, Bielova and Massacci propose to apply a distance metrics to capture the similarity between traces [2], and we could consider the cost required to obtain one trace from another as a distance metrics.…”
Section: Related Workmentioning
confidence: 99%
“…The Computer Research Association stated it as a grand challenge to develop an accurate risk analysis for cyber-security [9], and some measures need to be defined. There have been several approaches taking advantages of such measures [8,7,6,26] or trying to calculate them using market algorithms [25].…”
Section: Utility Gain and Damagementioning
confidence: 99%
“…In this paper, without loss of generality, we model our problem as in (2). Specifically, we address the problem of identifying the optimal transformations that produce the minimum risk and lower bound the utility above a given threshold.…”
Section: Problem Statementmentioning
confidence: 99%
“…A feasible node is the lattice vertex that satisfies all the given constraints that are mentioned in equations (1) and (2). Otherwise, it is called infeasible node.…”
Section: Definitionmentioning
confidence: 99%
See 1 more Smart Citation