Trust and Risk based Access Control and Access Control Constraints
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Nurmamat Heli | - |
dc.contributor.author | Kim, Mu Cheol | - |
dc.contributor.author | Sangyong Han | - |
dc.date.accessioned | 2023-02-10T05:41:09Z | - |
dc.date.available | 2023-02-10T05:41:09Z | - |
dc.date.issued | 2011-11 | - |
dc.identifier.issn | 1976-7277 | - |
dc.identifier.issn | 1976-7277 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/cau/handle/2019.sw.cau/60428 | - |
dc.description.abstract | Access control in dynamic environments needs the ability to provide more access opportunities of information to users, while also ensuring protection information from malicious users. Trust and risk are essential factors and can be combined together in access control decision-making to meet the above requirement. In this paper, we propose the combination of the trust and risk in access control to balance information accessibility and protection. Access control decision is made on the basis of trustworthiness of users and risk value of permissions. We use potential relations between users and relations between permissions in access control. Our approach not only provides more access opportunities for trustworthy users in accessing permissions, but also enforces traditional access control constraints such as Chinese Wall policy and Separation of Duty (SoD) of Role-Based Access Control (RBAC) model in an effective way. | - |
dc.format.extent | 18 | - |
dc.publisher | 한국인터넷정보학회 | - |
dc.title | Trust and Risk based Access Control and Access Control Constraints | - |
dc.type | Article | - |
dc.identifier.bibliographicCitation | KSII Transactions on Internet and Information Systems, v.5, no.11, pp 2254 - 2271 | - |
dc.description.isOpenAccess | N | - |
dc.citation.endPage | 2271 | - |
dc.citation.number | 11 | - |
dc.citation.startPage | 2254 | - |
dc.citation.title | KSII Transactions on Internet and Information Systems | - |
dc.citation.volume | 5 | - |
dc.publisher.location | 대한민국 | - |
dc.subject.keywordAuthor | Trust | - |
dc.subject.keywordAuthor | risk | - |
dc.subject.keywordAuthor | role-based access control | - |
dc.subject.keywordAuthor | constraints | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.description.journalRegisteredClass | kciCandi | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
84, Heukseok-ro, Dongjak-gu, Seoul, Republic of Korea (06974)02-820-6194
COPYRIGHT 2019 Chung-Ang University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.