2020
DOI: 10.3390/fi12060103
|View full text |Cite
|
Sign up to set email alerts
|

Risk-Based Access Control Model: A Systematic Literature Review

Abstract: Most current access control models are rigid, as they are designed using static policies that always give the same outcome in different circumstances. In addition, they cannot adapt to environmental changes and unpredicted situations. With dynamic systems such as the Internet of Things (IoT) with billions of things that are distributed everywhere, these access control models are obsolete. Hence, dynamic access control models are required. These models utilize not only access policies but also contextual and re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(10 citation statements)
references
References 48 publications
0
10
0
Order By: Relevance
“…However, privileges are often used with slightly differing semantics (Center, Computer Security Resource, 2022), which may lead to misconceptions. Atlam et al (2020) even explicitly distinguish between action and privilege. While actions represent the types of activities subjects can perform on objects, the privileges are the permissions granted to a subject to be able to perform particular activities on certain objects.…”
Section: Authorizationmentioning
confidence: 99%
See 2 more Smart Citations
“…However, privileges are often used with slightly differing semantics (Center, Computer Security Resource, 2022), which may lead to misconceptions. Atlam et al (2020) even explicitly distinguish between action and privilege. While actions represent the types of activities subjects can perform on objects, the privileges are the permissions granted to a subject to be able to perform particular activities on certain objects.…”
Section: Authorizationmentioning
confidence: 99%
“…Several methods for estimating access risks are proposed by various works including machine learning (Molloy et al , 2012), probability theory (Rajbhandari and Snekkenes, 2010) and fuzzy logic (Cheng et al , 2007 and Ni et al , 2010). The work of Atlam et al (2020) provides a survey of the state-of-the-art risk-based access control model along with the existing risk estimation techniques (Section 5).…”
Section: Access Control Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors in [15] consider elements such as the status of the aircraft systems, climate conditions, the payload condition, and knowledge of the operator on both the platform capabilities and dynamic aspects involved (level 1). The importance of data processing is highlighted in [16] [17] and it may come from different sources and emphasize a proper decision-making process to manage successfully crises situations (level 2). The authors in (1) state that operators' SA depends on data availability and their understanding based on the context in order to design actions in the future for a semi-autonomous mode (level 3).…”
Section: Related Workmentioning
confidence: 99%
“…An interesting access control scheme is the so-called risk-based access control model which estimates the security risk value related to the access request in order to dynamically determine the access decision. Authors in [48] perform a review of risk-based access control works.…”
Section: ) Risk-based Access Controlmentioning
confidence: 99%