2014
DOI: 10.1007/s00766-014-0204-0
|View full text |Cite
|
Sign up to set email alerts
|

Conviviality-driven access control policy

Abstract: Nowadays many organizations experience security incidents due to unauthorized access to information. To reduce the risk of such incidents, security policies are often employed to regulate access to information. Such policies, however, are often too restrictive, and users do not have the rights necessary to perform assigned duties. As a consequence, access control mechanisms are perceived by users as a barrier and thus bypassed, making the system insecure. In this paper we draw a bridge between the social conce… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 57 publications
0
2
0
Order By: Relevance
“…There must be a tradeoff between how much privacy the system allows, and how cooperative and convivial the system can be [131]. On the one hand, the more private the AAL system is, the less opportunities it offers to its users to cooperate and exchange information with each other, and the less convivial it is for users [132,133].…”
Section: Tools and Framework For Privacy Protectionmentioning
confidence: 99%
“…There must be a tradeoff between how much privacy the system allows, and how cooperative and convivial the system can be [131]. On the one hand, the more private the AAL system is, the less opportunities it offers to its users to cooperate and exchange information with each other, and the less convivial it is for users [132,133].…”
Section: Tools and Framework For Privacy Protectionmentioning
confidence: 99%
“…Approaches such as Role-Based Access Control or Attribute-Based Access Control could be used, e.g. (Kateb et al, 2014). The latter method offers the interesting perspective whereby a subject's requests to perform operations on objects are granted or denied based on the attributes of the subject, the object and the environment.…”
Section: Privacy and Securitymentioning
confidence: 99%