메뉴 건너뛰기




Volumn , Issue , 2017, Pages 254-260

An overview of risk estimation techniques in risk-based access control for the internet of things

Author keywords

Access control; Internet of things; Risk estimation; Risk based access control; Security risk

Indexed keywords

ACCESS CONTROL; BIG DATA; INTERNET OF THINGS; RISK ANALYSIS; RISK ASSESSMENT;

EID: 85024399591     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.5220/0006292602540260     Document Type: Conference Paper
Times cited : (41)

References (30)
  • 3
    • 34548769351 scopus 로고    scopus 로고
    • Fuzzy multi - level security: An experiment on quantified risk -Adaptive access control
    • Chen, P. et al., 2007. Fuzzy Multi - Level Security : An Experiment on Quantified Risk -Adaptive Access Control. 2007 IEEE Symposiu m on Security and Privacy(SP'07), pp.222-227.
    • (2007) 2007 IEEE Symposiu M on Security and Privacy(SP'07) , pp. 222-227
    • Chen, P.1
  • 7
    • 84951299033 scopus 로고    scopus 로고
    • Monte carlo simulation applied to support risk-based decision making in electricity distribution networks
    • Goerdin, S.A. V, Smit, J.J. & Mehairjan, R.P.Y., 2015b. Monte Carlo simulation applied to support risk-based decision making in electricity distribution networks. 2015 IEEE Eindhoven PowerTech.
    • (2015) 2015 IEEE Eindhoven PowerTech
    • Goerdin, S.A.V.1    Smit, J.J.2    Mehairjan, R.P.Y.3
  • 10
    • 0016264378 scopus 로고
    • Judgment under uncertainty: Heuristics and biases
    • Kahneman, D., Slovic, P. & Tversky, A., 1974. Judgment under uncertainty: Heuristics and biases. Science, 185(4157), pp.1124-1131.
    • (1974) Science , vol.185 , Issue.4157 , pp. 1124-1131
    • Kahneman, D.1    Slovic, P.2    Tversky, A.3
  • 11
    • 84888304052 scopus 로고    scopus 로고
    • A framework for risk assessment in access control systems
    • Sec 2012
    • Khambhammettu, H. et al., 2013. A framework for risk assessment in access control systems. Computers & Security, 39(Sec 2012), pp.86-103.
    • (2013) Computers & Security , vol.39 , pp. 86-103
    • Khambhammettu, H.1
  • 13
  • 17
    • 84878117524 scopus 로고    scopus 로고
    • Expert judfgement in risk analysis: A strategy to overcome uncertainities
    • Pluess, D., Groso, A. & Meyer, T., 2013. Expert Judfgement in Risk Analysis: A Strategy to Overcome Uncertainities. Chemical Engineering Transactions, 31, pp.307-312.
    • (2013) Chemical Engineering Transactions , vol.31 , pp. 307-312
    • Pluess, D.1    Groso, A.2    Meyer, T.3
  • 22
    • 84861100364 scopus 로고    scopus 로고
    • Dynamic riskbased decision methods for access control systems
    • Shaikh, R.A., Adi, K. & Logrippo, L., 2012. Dynamic riskbased decision methods for access control systems. Computers and Security, 31(4), pp.447-464.
    • (2012) Computers and Security , vol.31 , Issue.4 , pp. 447-464
    • Shaikh, R.A.1    Adi, K.2    Logrippo, L.3
  • 24
    • 84926646703 scopus 로고    scopus 로고
    • Applying fuzzy logic to risk assessment and decision-making
    • Canadian Institute of Actuaries, Society of Actuaries
    • Shang, K. & Hossen, Z., 2013. Applying Fuzzy Logic to Risk Assessment and Decision-Making. Casualty Actuarial Society, Canadian Institute of Actuaries, Society of Actuaries, pp.1-59.
    • (2013) Casualty Actuarial Society , pp. 1-59
    • Shang, K.1    Hossen, Z.2
  • 27
    • 84895134059 scopus 로고    scopus 로고
    • A vertical handoff method via self- selection decision tree for internet of vehicles
    • Wang, S. et al., 2016. A Vertical Handoff Method via Self- Selection Decision Tree for Internet of Vehicles. IEEE Systems Journal, 10(3), pp.1183-1192.
    • (2016) IEEE Systems Journal , vol.10 , Issue.3 , pp. 1183-1192
    • Wang, S.1
  • 28
    • 84894059526 scopus 로고    scopus 로고
    • An efficient authentication and access control scheme for perception layer of internet of things
    • Ye, N. et al., 2014. An efficient authentication and access control scheme for perception layer of internet of things. Applied Mathematics and Information Sciences, 8(4), pp.1617-1624.
    • (2014) Applied Mathematics and Information Sciences , vol.8 , Issue.4 , pp. 1617-1624
    • Ye, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.