2016
DOI: 10.1016/j.future.2014.10.012
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic counter-measures for risk-based access control systems: An evolutive approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 32 publications
(17 citation statements)
references
References 36 publications
(47 reference statements)
0
17
0
Order By: Relevance
“…security measures to bring back risk to acceptable levels [23]. An evolution-based genetic algorithm is devised to help lower the risk incurred from the access request by manipulating the security metrics that the organization employs.…”
Section: S S Alaqeeli Et Almentioning
confidence: 99%
See 2 more Smart Citations
“…security measures to bring back risk to acceptable levels [23]. An evolution-based genetic algorithm is devised to help lower the risk incurred from the access request by manipulating the security metrics that the organization employs.…”
Section: S S Alaqeeli Et Almentioning
confidence: 99%
“…In the former, risk assessment investigated the ways to assess the riskiness of an access request before granting access to the resources [17]- [21]; namely, quantifying the risk. In the latter, efforts focused on approaches and strategies that bring down the risk that has already been assessed [23] [24] [25].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, this research has been the benchmark for this paper in designing the architecture of proposed authentication scheme. Afterwards, most of previous works bypass the need to protect privacy of user in developing risk based access control model [28], [31], [32].…”
Section: Risk-adaptable Access Control (Radac)mentioning
confidence: 99%
“…For [40] risks are closely associated with system vulnerabilities and vulnerabilities refer to any weaknesses that can be exploited. Reference [20] calculates the risk of a threat over an asset by multiplying the probability of occurrence of the threat over the asset by the relevance of the asset and dividing the result by the effectiveness of the security controls implemented. In [21] vulnerabilities are flaws or weaknesses in a system that could be exploited, exploits are ways known to take advantage of specific software vulnerabilities and threats have the potential to violate security.…”
Section: Cyber-security Issuesmentioning
confidence: 99%