2009
DOI: 10.1016/j.cose.2009.03.003
|View full text |Cite
|
Sign up to set email alerts
|

Adapting usage control as a deterrent to address the inadequacies of access controls

Abstract: a b s t r a c tAccess controls are difficult to implement and evidently deficient under certain conditions. Traditional controls offer no protection for unclassified information, such as a telephone list of employees that is unrestricted, yet available only to members of the company. On the opposing side of the continuum, organizations such as hospitals that manage highly sensitive information require stricter access control measures. Yet, traditional access control may well have inadvertent consequences in su… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 24 publications
0
3
0
Order By: Relevance
“…Information accountability means the use of information should be transparent so it is possible to determine whether a particular use is appropriate under a given set of rules and that the system enables individuals and institutions to be held accountable for misuse [49]. Some research work is already heading in this direction, for instance, there is a body of work on audit-based solutions for data access in healthcare systems [50], or suggesting means of deterrence for information that requires more than traditional access control enforcement [51], or others offering a posteriori control for systems that require flexibility with accesses that are unanticipated under special circumstances [52]. However, there is a lack of such work in the context of hyper-connected systems like social networks, where the end user is the major active player, i.e.…”
Section: A System-centric To Cross-domain Privacy Requirementsmentioning
confidence: 99%
“…Information accountability means the use of information should be transparent so it is possible to determine whether a particular use is appropriate under a given set of rules and that the system enables individuals and institutions to be held accountable for misuse [49]. Some research work is already heading in this direction, for instance, there is a body of work on audit-based solutions for data access in healthcare systems [50], or suggesting means of deterrence for information that requires more than traditional access control enforcement [51], or others offering a posteriori control for systems that require flexibility with accesses that are unanticipated under special circumstances [52]. However, there is a lack of such work in the context of hyper-connected systems like social networks, where the end user is the major active player, i.e.…”
Section: A System-centric To Cross-domain Privacy Requirementsmentioning
confidence: 99%
“…Within this real-world inter-organisational cooperation scenario, it was found that traditional access controls do not comply with the organisation's requirements and that cooperation and competitive reasons motivate the use of interactive and optimistic access controls [12]. Since the flexibility offered by optimistic access control may well be exploited, Padayachee and Eloff [4] proposed that optimistic access control should be complemented with usage control.…”
Section: Background To Access Controlsmentioning
confidence: 99%
“…Padayachee and Eloff [4] presented a model for addressing the inadequacies of access controls, which involved a reformulation of usage control as a mechanism to deter users from information abuse, rather than one that is entirely dependent on denial of access. Padayachee and Eloff's [4] approach towards deterrence control is an application of optimistic access control, which is useful in cases where openness and availability are more important than complete confidentiality [5]. Optimistic access control involves a combination of audit and accountability aspects as deterrent mechanisms to encourage trustworthy behaviour.…”
Section: Introductionmentioning
confidence: 99%