메뉴 건너뛰기




Volumn , Issue , 2010, Pages 29-34

Risk-aware usage decision making in highly dynamic systems

Author keywords

Freshness of attributes; Risk assessment; Security; Trustworthiness of attributes; UCON; Usage control

Indexed keywords

ACCESS DECISION; DYNAMIC SYSTEMS; IMPRECISE VALUES; MARKOV CHAIN; POLICY ENFORCEMENT; USAGE CONTROL;

EID: 77954531374     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICIMP.2010.13     Document Type: Conference Paper
Times cited : (22)

References (18)
  • 1
    • 34249881318 scopus 로고    scopus 로고
    • Risk management for distributed authorization
    • C. Skalka, X. S. Wang, and P. Chapin, "Risk management for distributed authorization," J. Comp. Sec., vol. 15, no. 4, pp. 447-489, 2007.
    • (2007) J. Comp. Sec. , vol.15 , Issue.4 , pp. 447-489
    • Skalka, C.1    Wang, X.S.2    Chapin, P.3
  • 2
    • 33747817026 scopus 로고    scopus 로고
    • Reconfiguring role based access control policies using risk, semantics
    • B. Aziz, S. N. Foley, J. Herbert, and G. Swart, "Reconfiguring role based access control policies using risk, semantics," J. High Speed Networks, vol. 15, no. 3, pp. 261-273, 2006.
    • (2006) J. High Speed Networks , vol.15 , Issue.3 , pp. 261-273
    • Aziz, B.1    Foley, S.N.2    Herbert, J.3    Swart, G.4
  • 4
    • 35248873795 scopus 로고    scopus 로고
    • Usage control: A vision for next generation access control
    • R. S. Sandhu and J. Park, "Usage control: A vision for next generation access control," in. Proc. of MMM-ACNS-03, 2003, pp. 17-31.
    • (2003) Proc. of MMM-ACNS-03 , pp. 17-31
    • Sandhu, R.S.1    Park, J.2
  • 5
    • 70350630603 scopus 로고    scopus 로고
    • Remote attestation of attribute updates and information flows in a ucon system
    • ser. LNCS, Springer-Verlag
    • M. Nauman, M. Alam, X. Zhang, and T. Ali, "Remote attestation of attribute updates and information flows in a ucon system," in Proc. of Trust-09, ser. LNCS, Springer-Verlag, 2009, vol. 5471, pp 63-80.
    • (2009) Proc. of Trust-09 , vol.5471 , pp. 63-80
    • Nauman, M.1    Alam, M.2    Zhang, X.3    Ali, T.4
  • 6
    • 67649670564 scopus 로고    scopus 로고
    • Safety analysis of usage control authorization models
    • X. Zhang, R. Sandhu, and F. Parisi-Presicce, "Safety analysis of usage control authorization models," in Proc. of ASIACCS, 2006, pp. 243-254.
    • (2006) Proc. of ASIACCS , pp. 243-254
    • Zhang, X.1    Sandhu, R.2    Parisi-Presicce, F.3
  • 8
    • 3142523603 scopus 로고    scopus 로고
    • ABC usage control model
    • ABC usage control model," TISSEC, vol. 7, no. 1, pp. 128-174, 2004.
    • (2004) TISSEC , vol.7 , Issue.1 , pp. 128-174
    • Park, J.1    Sandhu, R.2
  • 11
    • 33748543201 scopus 로고    scopus 로고
    • Distributed usage control
    • A. Pretschner, M. Hilty, and D. Basin, "Distributed usage control," ACM Comm., vol. 49, no. 9, pp. 39-44, 2006.
    • (2006) ACM Comm. , vol.49 , Issue.9 , pp. 39-44
    • Pretschner, A.1    Hilty, M.2    Basin, D.3
  • 12
    • 77954023526 scopus 로고    scopus 로고
    • A framework for analysis of data freshness
    • M. Bouzeghoub and V. Peralta, "A framework for analysis of data freshness," in Proc. of IQIS-04, 2004, pp. 59-67.
    • (2004) Proc. of IQIS-04 , pp. 59-67
    • Bouzeghoub, M.1    Peralta, V.2
  • 13
    • 17644399080 scopus 로고    scopus 로고
    • Risk management guide for information technology systems
    • G. Stoneburner, A. Goguen, and A. Feringa, "Risk management guide for information technology systems," NIST, Tech. Rep. 800-30, 2001.
    • (2001) NIST, Tech. Rep. , vol.800 , Issue.30
    • Stoneburner, G.1    Goguen, A.2    Feringa, A.3
  • 16
    • 51349136634 scopus 로고    scopus 로고
    • Security policy preevaluation towards risk analysis
    • Y. Han, Y. Hori, and K. Sakurai, "Security policy preevaluation towards risk analysis," in Proc. of ISA-08, IEEE, 2008, pp. 415-420.
    • (2008) Proc. of ISA-08, IEEE , pp. 415-420
    • Han, Y.1    Hori, Y.2    Sakurai, K.3
  • 17
    • 33845414618 scopus 로고    scopus 로고
    • Toward information sharing: Benefit and risk access control (BARAC)
    • L. Zhang, A. Brodsky, and S. Jajodia, "Toward information sharing: Benefit and risk access control (BARAC)," in Proc. of POLICY-06, IEEE, 2006, pp. 45-53.
    • (2006) Proc. of POLICY-06, IEEE , pp. 45-53
    • Zhang, L.1    Brodsky, A.2    Jajodia, S.3
  • 18
    • 60349122060 scopus 로고    scopus 로고
    • Using trust and risk in access control for grid environment
    • Y. Li, H. Sun, Z. Chen, J. Ren, and H. Luo, "Using trust and risk in access control for grid environment," Proc. of SecTech08, 2008, pp. 13-16.
    • (2008) Proc. of SecTech08 , pp. 13-16
    • Li, Y.1    Sun, H.2    Chen, Z.3    Ren, J.4    Luo, H.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.