2012
DOI: 10.1007/978-3-642-29963-6_11
|View full text |Cite
|
Sign up to set email alerts
|

Risk-Aware Role-Based Access Control

Abstract: Abstract. The increasing need to share information in dynamic environments has created a requirement for risk-aware access control systems. The standard RBAC model is designed to operate in a relatively stable, closed environment and does not include any support for risk. In this paper, we explore a number of ways in which the RBAC model can be extended to incorporate notions of risk. In particular, we develop three simple risk-aware RBAC models that differ in the way in which risk is represented and accounted… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
48
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 64 publications
(48 citation statements)
references
References 16 publications
0
48
0
Order By: Relevance
“…The works in risk-aware access control models focus on the concept of risk-awareness in the view of managing the trade-off between the risk of allowing an unauthorized access, and the cost of not permitting it [29]. While we draw the focus on adapting the model to have a fine-grained access control considering several risk attributes calculated by the risk management system.…”
Section: Related Workmentioning
confidence: 99%
“…The works in risk-aware access control models focus on the concept of risk-awareness in the view of managing the trade-off between the risk of allowing an unauthorized access, and the cost of not permitting it [29]. While we draw the focus on adapting the model to have a fine-grained access control considering several risk attributes calculated by the risk management system.…”
Section: Related Workmentioning
confidence: 99%
“…This predicate is used with role based access control in open systems to produce the authorization decisions. Recently, a similar cost based risk evaluation is proposed by extending the widely accepted role based access control [30] (M04). In [31] (M03), risk is treated as a finite resource which can be quantified as a liability for performing an action.…”
Section: Risk Based Authorization Modelsmentioning
confidence: 99%
“…The authors proposed an approach for the risk estimation under incomplete and imprecise data using fuzzy inferences. Similarly, Chen and Crampton propose a mitigation strategy [5] in the context of risk-based access control for RBAC models. The use of mitigations can provide the access control monitor with a wider range of possible decisions: denying a request, allowing it with some mitigations, or allowing it with no condition.…”
Section: Related Workmentioning
confidence: 99%