2014
DOI: 10.1016/j.jcss.2014.02.003
|View full text |Cite
|
Sign up to set email alerts
|

Self-adaptive federated authorization infrastructures

Abstract: Abstract-Authorization infrastructures are an integral part of any network where resources need to be protected. They act as the gateway for providing (or denying) subjects (users) access to resources. As networks expand and organizations start to federate access to their resources, authorization infrastructures become increasingly difficult to manage. In this paper, we explore the automatic adaptation of authorization assets (policies and subject access rights) in order to manage federated authorization infra… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
27
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 17 publications
(27 citation statements)
references
References 21 publications
0
27
0
Order By: Relevance
“…This differs to previous work [4,5] whereby all solutions were assumed to result in a verified state of access, and adaptation constraints were not considered.…”
Section: Figure 5: Saaf Controller Model Verificationmentioning
confidence: 86%
See 4 more Smart Citations
“…This differs to previous work [4,5] whereby all solutions were assumed to result in a verified state of access, and adaptation constraints were not considered.…”
Section: Figure 5: Saaf Controller Model Verificationmentioning
confidence: 86%
“…SAAF is based on the MAPE-K [23] feedback loop for identifying and responding to insider threats [13], which are typically conducted through user exploitation of legitimately assigned access rights. The provision of self-adaptation to authorisation infrastructures has shown to be a promising solution to respond to insider threats [4,5], as the adaptation of access control can prevent or limit a malicious user's ability to access protected resources, thus mitigating the attack. The SAAF controller performs adaptations when reacting to identified insider attacks, either by modifying access control policies or user access rights (e.g., the removal of user RBAC roles).…”
Section: Self-adaptive Authorisationmentioning
confidence: 99%
See 3 more Smart Citations