[go: up one dir, main page]

Cheng et al., 2007 - Google Patents

Fuzzy multi-level security: An experiment on quantified risk-adaptive access control

Cheng et al., 2007

View PDF
Document ID
13597259656306609070
Author
Cheng P
Rohatgi P
Keser C
Karger P
Wagner G
Reninger A
Publication year
Publication venue
2007 IEEE symposium on security and privacy (SP'07)

External Links

Snippet

This paper presents a new model for, or rather a new way of thinking about adaptive, risk- based access control. Our basic premise is that there is always inherent uncertainty and risk in access control decisions that is best addressed in an explicit way. We illustrate this …
Continue reading at dmac.rutgers.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models

Similar Documents

Publication Publication Date Title
Cheng et al. Fuzzy multi-level security: An experiment on quantified risk-adaptive access control
Klosowski The state of consumer data privacy laws in the US (and why it matters)
US12277173B2 (en) Predicted data use obligation match using data differentiators
US9582674B2 (en) Risk adaptive information flow based access control
Shaikh et al. Dynamic risk-based decision methods for access control systems
US20060253709A1 (en) System and method for fuzzy multi-level security
US20080016546A1 (en) Dynamic profile access control
Lambert The Data Protection Officer: Profession, Rules, and Role
US10038724B2 (en) Electronic access controls
CN114186275A (en) Privacy protection method, device, computer equipment and storage medium
Salim et al. An approach to access control under uncertainty
Celikel et al. A risk management approach to RBAC
Abomhara et al. Towards Risk-aware Access Control Framework for Healthcare Information Sharing.
Carter Health information privacy: can Congress protect confidential medical information in the information age
Armando et al. Balancing trust and risk in access control
Kristiana et al. Portrait of the polemic of fraud in conventional and sharia insurance company
Marques et al. Auditor independence: a qualitative study of the perceptions of auditors
Diaz et al. The risks and liability of governing board members to address cyber security risks in higher education
US11373130B1 (en) Policy exception risk determination engine with visual awareness guide
Landwehr 2018: A big year for privacy
Vagadia Outsourcing to India—a legal handbook
Kumar et al. Privacy preservation in service operations by minimizing sensitive data exposure
Han et al. Apply measurable risk to strengthen security of a role-based delegation supporting workflow system
Kathuria Data empowerment and protection architecture: Concept and assessment
Celikel et al. Managing risks in RBAC employed distributed environments