An explainable machine learning approach to risk-adaptive access control

R Houtsma - 2022 - essay.utwente.nl
Existing Access Control Systems are rigid and complex in large-scale organizations. Risk-
Adaptive Access Control provides a dynamic solution. This research proposes an artificial …

Optimal placement of security resources for the Internet of Things

A Rullo, E Serra, E Bertino, J Lobo - The Internet of Things for Smart Urban …, 2019 - Springer
Abstract In many Internet of Thing application domains security is a critical requirement,
because malicious parties can undermine the effectiveness of IoT-based systems by …

Enforcing a risk assessment approach in access control policies management: analysis, correlation study and model enhancement

PA Evina, FL Ayachi, F Jaïdi… - 2019 15th International …, 2019 - ieeexplore.ieee.org
Nowadays, the domain of Information System (IS) security is closely related to that of Risk
Management (RM). As an immediate consequence, talking about and tackling the security of …

[PDF][PDF] Securing IoMT Applications: An Approach for Enhancing the Reliability of Security Policies within Cloud Databases

S KSIBI, F JAIDI, A BOUHOULA - Journal of Information Science …, 2024 - researchgate.net
Applications of the Internet-of-Things (IoT) in healthcare have a great potential since they
bring, in a cost effective manner, supreme solutions to large scale medicalcare. The Internet …

Quantitative evaluation of enforcement strategies: Position paper

V Ciancia, F Martinelli, M Ilaria, C Morisset - International Symposium on …, 2013 - Springer
A security enforcement mechanism runs in parallel with a system to check and modify its run-
time behaviour, so that it satisfies some security policy. For each policy, several enforcement …

Fine-grained Dynamic Authorization and Access Control in the Context of Graph-Structured Data/submitted by Aya Khaled Youssef Sayed Mohamed

AKYS Mohamed - 2024 - epub.jku.at
With the continuous growth of data and its complexity, advanced requirements have to be
considered to protect resources and private information against unauthorized disclosure …

A theory of gray security policies

D Ray, J Ligatti - Computer Security--ESORICS 2015: 20th European …, 2015 - Springer
This paper generalizes traditional models of security policies, from specifications of whether
programs are secure, to specifications of how secure programs are. This is a generalization …

[PDF][PDF] Usability, security, and privacy of risk-based authentication.

S Wiefling - 2023 - researchgate.net
Weaknesses in password-based authentication have always shaken password security,
especially with the rise of data breaches. Credential stuffing and password spraying attacks …

[PDF][PDF] A Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment.

F Jaidi, FL Ayachi, A Bouhoula - SCSS, 2017 - researchgate.net
Nowadays, the access control is becoming increasingly important for open, ubiquitous and
critical systems. Nonetheless, efficient Administration, Management, Safety analysis and …

R2q: A risk quantification framework to authorize requests in web-based collaborations

N Ghosh, R Singhal, SK Das - Proceedings of the 2019 ACM Asia …, 2019 - dl.acm.org
Web-based collaboration provides a platform which allows users from different domains to
share and access information. In such an environment, mitigating threats from insider attacks …