Cheng et al., 2007 - Google Patents
Fuzzy multi-level security: An experiment on quantified risk-adaptive access controlCheng et al., 2007
View PDF- Document ID
- 13597259656306609070
- Author
- Cheng P
- Rohatgi P
- Keser C
- Karger P
- Wagner G
- Reninger A
- Publication year
- Publication venue
- 2007 IEEE symposium on security and privacy (SP'07)
External Links
Snippet
This paper presents a new model for, or rather a new way of thinking about adaptive, risk- based access control. Our basic premise is that there is always inherent uncertainty and risk in access control decisions that is best addressed in an explicit way. We illustrate this …
- 230000003044 adaptive 0 abstract description 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Cheng et al. | Fuzzy multi-level security: An experiment on quantified risk-adaptive access control | |
Klosowski | The state of consumer data privacy laws in the US (and why it matters) | |
US12277173B2 (en) | Predicted data use obligation match using data differentiators | |
US9582674B2 (en) | Risk adaptive information flow based access control | |
Shaikh et al. | Dynamic risk-based decision methods for access control systems | |
US20060253709A1 (en) | System and method for fuzzy multi-level security | |
US20080016546A1 (en) | Dynamic profile access control | |
Lambert | The Data Protection Officer: Profession, Rules, and Role | |
US10038724B2 (en) | Electronic access controls | |
CN114186275A (en) | Privacy protection method, device, computer equipment and storage medium | |
Salim et al. | An approach to access control under uncertainty | |
Celikel et al. | A risk management approach to RBAC | |
Abomhara et al. | Towards Risk-aware Access Control Framework for Healthcare Information Sharing. | |
Carter | Health information privacy: can Congress protect confidential medical information in the information age | |
Armando et al. | Balancing trust and risk in access control | |
Kristiana et al. | Portrait of the polemic of fraud in conventional and sharia insurance company | |
Marques et al. | Auditor independence: a qualitative study of the perceptions of auditors | |
Diaz et al. | The risks and liability of governing board members to address cyber security risks in higher education | |
US11373130B1 (en) | Policy exception risk determination engine with visual awareness guide | |
Landwehr | 2018: A big year for privacy | |
Vagadia | Outsourcing to India—a legal handbook | |
Kumar et al. | Privacy preservation in service operations by minimizing sensitive data exposure | |
Han et al. | Apply measurable risk to strengthen security of a role-based delegation supporting workflow system | |
Kathuria | Data empowerment and protection architecture: Concept and assessment | |
Celikel et al. | Managing risks in RBAC employed distributed environments |