Sciweavers

Share
JHSN
2006

Reconfiguring Role Based Access Control policies using risk semantics

8 years 12 months ago
Reconfiguring Role Based Access Control policies using risk semantics
We present a refined model for Role Based Access Control policies and define a risk measure for the model, which expresses elements of the operational, combinatorial and conflict of interest risks present in a particular policy instance. The model includes risk-reducing mechanisms corresponding to practical mechanisms like firewalls, stack checking, redundancy, and event tracking that are frequently used to reduce risks in real systems. We also define policy transformation operators that produce new policies that allow the behaviours of the old policy while potentially reducing the risk measure. Sequences of these operators can be used to find policies that are less risky but still implement the initial policy. An example is give for Grid computing.
Benjamin Aziz, Simon N. Foley, John Herbert, Garre
Added 13 Dec 2010
Updated 13 Dec 2010
Type Journal
Year 2006
Where JHSN
Authors Benjamin Aziz, Simon N. Foley, John Herbert, Garret Swart
Comments (0)
books