메뉴 건너뛰기




Volumn , Issue , 2010, Pages 62-70

A calculus for the qualitative risk assessment of policy override authorization

Author keywords

Authorization policy; Policy override; Risk assessment

Indexed keywords

ASSESSMENT PRACTICES; AUTHORIZATION POLICY; DECISION MAKING PROCESS; POLICY OVERRIDE; QUALITATIVE RISK ASSESSMENT; RESEARCH COMMUNITIES;

EID: 77958052214     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1854099.1854115     Document Type: Conference Paper
Times cited : (12)

References (43)
  • 4
    • 0025641511 scopus 로고
    • Providing a exible security override for trusted systems
    • L. Badger. Providing a exible security override for trusted systems. In CSFW, pages 115-121, 1990.
    • (1990) CSFW , pp. 115-121
    • Badger, L.1
  • 5
    • 0027804413 scopus 로고
    • Information systems security design methods: Implications for information systems development
    • R. Baskerville. Information systems security design methods: implications for information systems development. ACM Comput. Surv., 25(4):375-414, 1993.
    • (1993) ACM Comput. Surv. , vol.25 , Issue.4 , pp. 375-414
    • Baskerville, R.1
  • 7
    • 77958031811 scopus 로고    scopus 로고
    • Bundesamt füherheit in der Informationstechnik (BSI). Version 2.0
    • Bundesamt füherheit in der Informationstechnik (BSI). BSI-Standard 100-2: IT-Grundschutz-Vorgehensweise. Version 2.0, 2008.
    • (2008) BSI-Standard 100-2: IT-Grundschutz-Vorgehensweise
  • 11
    • 33745451609 scopus 로고    scopus 로고
    • A policy based architecture for NSA RAdAC model
    • June
    • R. Choudhary. A policy based architecture for NSA RAdAC model. In Information Assurance Workshop (IAW 05), pages 294-301, June 2005.
    • (2005) Information Assurance Workshop (IAW 05) , pp. 294-301
    • Choudhary, R.1
  • 12
    • 0033562565 scopus 로고    scopus 로고
    • Privacy in clinical information systems in secondary care
    • May
    • I. Denley and S. W. Smith. Privacy in clinical information systems in secondary care. BMJ, 318(7194):1328-31, May 1999.
    • (1999) BMJ , vol.318 , Issue.7194 , pp. 1328-1331
    • Denley, I.1    Smith, S.W.2
  • 16
    • 0001073135 scopus 로고
    • The use of knowledge in society
    • September. Reprinted in F.A. Hayek (ed.), Individualism and Economic Order. London: Routledge and Kegan Paul
    • F. A. Hayek. The use of knowledge in society. American Economic Review, 35:519-530, September 1945. Reprinted in F.A. Hayek (ed.), Individualism and Economic Order. London: Routledge and Kegan Paul.
    • (1945) American Economic Review , vol.35 , pp. 519-530
    • Hayek, F.A.1
  • 19
    • 17844381878 scopus 로고    scopus 로고
    • Isram: Information security risk analysis method
    • B. Karabacak and I. Sogukpinar. Isram: information security risk analysis method. Computers & Security, 24(2):147-159, 2005.
    • (2005) Computers & Security , vol.24 , Issue.2 , pp. 147-159
    • Karabacak, B.1    Sogukpinar, I.2
  • 20
    • 35048862465 scopus 로고    scopus 로고
    • Information security risk assessment, aggregation, and mitigation
    • H. Wang, J. Pieprzyk, and V. Varadharajan, editors, ACISP. Springer
    • A. K. Lenstra and T. Voss. Information security risk assessment, aggregation, and mitigation. In H. Wang, J. Pieprzyk, and V. Varadharajan, editors, ACISP, volume 3108 of Lecture Notes in Computer Science, pages 391-401. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3108 , pp. 391-401
    • Lenstra, A.K.1    Voss, T.2
  • 22
    • 0036173202 scopus 로고    scopus 로고
    • Insider threat prediction tool: Evaluating the probability of it misuse
    • G. Magklaras and S. Furnell. Insider threat prediction tool: Evaluating the probability of it misuse. Computers & Security, 21(1):62-73, 2002.
    • (2002) Computers & Security , vol.21 , Issue.1 , pp. 62-73
    • Magklaras, G.1    Furnell, S.2
  • 30
    • 33749681754 scopus 로고    scopus 로고
    • Towards a mechanism for discretionary overriding of access control
    • B. Christianson, B. Crispo, J. A. Malcolm, and M. Roe, editors, Security Protocols Workshop. Springer
    • E. Rissanen, B. S. Firozabadi, and M. J. Sergot. Towards a mechanism for discretionary overriding of access control. In B. Christianson, B. Crispo, J. A. Malcolm, and M. Roe, editors, Security Protocols Workshop, volume 3957 of Lecture Notes in Computer Science, pages 312-319. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3957 , pp. 312-319
    • Rissanen, E.1    Firozabadi, B.S.2    Sergot, M.J.3
  • 31
    • 39049126192 scopus 로고    scopus 로고
    • A study of access control requirements for healthcare systems based on audit trails from access logs
    • IEEE Computer Society
    • L. Røstad and O. Edsberg. A study of access control requirements for healthcare systems based on audit trails from access logs. In ACSAC, pages 175-186. IEEE Computer Society, 2006.
    • (2006) ACSAC , pp. 175-186
    • Røstad, L.1    Edsberg, O.2
  • 32
  • 34
    • 0036395373 scopus 로고    scopus 로고
    • A framework for understanding and predicting insider attacks
    • E. E. Schultz. A framework for understanding and predicting insider attacks. Computers & Security, 21(6):526-531, 2002.
    • (2002) Computers & Security , vol.21 , Issue.6 , pp. 526-531
    • Schultz, E.E.1
  • 38
    • 85041101752 scopus 로고    scopus 로고
    • The CRAMM Manager. Technical report, Insight Consulting
    • The CRAMM Manager. Cramm user guide issue 5.1. Technical report, Insight Consulting, 2005.
    • (2005) Cramm User Guide Issue 5.1
  • 39
    • 33750683067 scopus 로고    scopus 로고
    • Understanding the perpetration of employee computer crime in the organisational context
    • R. Willison. Understanding the perpetration of employee computer crime in the organisational context. Information and Organization, 16(4):304-324, 2006.
    • (2006) Information and Organization , vol.16 , Issue.4 , pp. 304-324
    • Willison, R.1
  • 40
    • 33749351964 scopus 로고    scopus 로고
    • Opportunities for computer crime: Considering systems risk from a criminological perspective
    • R. Willison and J. Backhouse. Opportunities for computer crime: considering systems risk from a criminological perspective. European Journal, 15(4), 2006.
    • (2006) European Journal , vol.15 , Issue.4
    • Willison, R.1    Backhouse, J.2
  • 41
    • 24644478392 scopus 로고    scopus 로고
    • An insider threat model for adversary simulation
    • R. H. Anderson, T. Bozek, T. Longstaff, W. Meitzler, M. Skroch, and K. Van Wyk, editors. RAND
    • B. Wood. An insider threat model for adversary simulation. In R. H. Anderson, T. Bozek, T. Longstaff, W. Meitzler, M. Skroch, and K. Van Wyk, editors, Research on Mitigating the Insier Threat to Information Systems #2. RAND, 2000.
    • (2000) Research on Mitigating the Insier Threat to Information Systems , vol.2
    • Wood, B.1
  • 43
    • 77958071874 scopus 로고    scopus 로고
    • The value of escalation and incentives in managing information access
    • Springer-Verlag New York, Inc.
    • X. Zhao and M. E. Johnson. The value of escalation and incentives in managing information access. In Managing Information Risk and the Economics of Security. Springer-Verlag New York, Inc., 2009.
    • (2009) Managing Information Risk and the Economics of Security
    • Zhao, X.1    Johnson, M.E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.