Engineering Adaptive Software Systems 2019
DOI: 10.1007/978-981-13-2185-6_3
|View full text |Cite
|
Sign up to set email alerts
|

Challenges in Engineering Self-Adaptive Authorisation Infrastructures

Abstract: As organisations expand and interconnect, authorisation infrastructures become increasingly difficult to manage. Several solutions have been proposed, including self-adaptive authorisation, where the access control policies are dynamically adapted at run-time to respond to misuse and malicious behaviour. The ultimate goal of self-adaptive authorisation is to reduce human intervention, make authorisation infrastructures more responsive to malicious behaviour, and manage access control in a more cost effective w… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 52 publications
0
1
0
Order By: Relevance
“…Self-adaptive systems are able to modify their behaviour and/or structure in response to changes that occur to the system, its environment, or even its goals [26]. A self-adaptive authorisation infrastructure is a selfadaptive system tailored to adapt, at run-time, access control policies and their enforcement [30]. An important aspect when evaluating the resilience of a self-adaptive authorisation infrastructure is to demonstrate its ability to mitigate abuse in access control.…”
Section: Introductionmentioning
confidence: 99%
“…Self-adaptive systems are able to modify their behaviour and/or structure in response to changes that occur to the system, its environment, or even its goals [26]. A self-adaptive authorisation infrastructure is a selfadaptive system tailored to adapt, at run-time, access control policies and their enforcement [30]. An important aspect when evaluating the resilience of a self-adaptive authorisation infrastructure is to demonstrate its ability to mitigate abuse in access control.…”
Section: Introductionmentioning
confidence: 99%