Frictionless authentication systems: emerging trends, Research challenges and opportunities

V Rimmer, D Preuveneers, W Joosen… - arXiv preprint arXiv …, 2018 - arxiv.org
Authentication and authorization are critical security layers to protect a wide range of online
systems, services and content. However, the increased prevalence of wearable and mobile …

Towards open data-driven evaluation of access control policies

B Aziz - Computer Standards & Interfaces, 2018 - Elsevier
Modern approaches towards the understanding of the behaviour of systems and policies
have recently been driven by the abundance of open and non-open data moving away from …

A dynamic risk-based access control approach: model and implementation

S Savinov - 2017 - uwspace.uwaterloo.ca
Access control (AC) refers to mechanisms and policies that restrict access to resources, thus
regulating access to physical or virtual resources of an information system. AC approaches …

SAFE-PASS: Stewardship, Advocacy, Fairness and Empowerment in Privacy, Accountability, Security, and Safety for Vulnerable Groups

I Ray, B Thuraisingham, J Vaidya, S Mehrotra… - Proceedings of the 28th …, 2023 - dl.acm.org
Our vision is to achieve societally responsible secure and trustworthy cyberspace that puts
algorithmic and technological checks and balances on the indiscriminate sharing and …

Risk based access control in cloud computing

H Lakshmi, S Namitha, S Gopalan… - … on Green Computing …, 2015 - ieeexplore.ieee.org
Cloud computing is one of the most trending technologies of today. Most of the resources we
use on an everyday basis are stored online as cloud storage. Our files, which have sensitive …

Nudging for quantitative access control systems

C Morisset, T Groß, A van Moorsel… - … HAS 2014, Held as Part of …, 2014 - Springer
On the one hand, an access control mechanism must make a conclusive decision for a given
access request. On the other hand, such a mechanism usually relies on one or several …

Assessing a methodology's project risk management competence

E Mnkandla - Journal of Contemporary Management, 2012 - journals.co.za
Many organisations do not perform risk management in their systems development projects;
hence many projects tend to be like uninsured assets. Since the massive increase in …

[引用][C] 基于模糊聚类的无权值风险综合评判算法

王建军, 李建平, 杜仕甫 - 系统工程理论与实践, 2015

Indeterminacy-aware prediction model for authentication in IoT.

M Heydari - 2020 - eprints.bournemouth.ac.uk
The Internet of Things (IoT) has opened a new chapter in data access. It has brought
obvious opportunities as well as major security and privacy challenges. Access control is …

A risk awareness approach for monitoring the compliance of RBAC-based policies

F Jaidi, FL Ayachi - 2015 12th International Joint Conference on …, 2015 - ieeexplore.ieee.org
The considerable increase of the risk associated to inner threats has motivated researches
in risk assessment for access control systems. Two main approaches were adapted:(i) a risk …