2014 IEEE Security and Privacy Workshops 2014
DOI: 10.1109/spw.2014.14
|View full text |Cite
|
Sign up to set email alerts
|

Resilience as a New Enforcement Model for IT Security Based on Usage Control

Abstract: Abstract-Security and privacy are not only general requirements of a society but also indispensable enablers for innovative IT infrastructure applications aiming at increased, sustainable welfare and safety of a society. A critical activity of these IT applications is spontaneous information exchange. This information exchange, however, creates inevitable, unknown dependencies between the participating IT systems, which, in turn threaten security and privacy. With the current approach to IT security, security … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2016
2016

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 35 publications
0
1
0
Order By: Relevance
“…The former evaluation results in evidence INFOR-MATION ; the evaluation of the workflow instance results in evidence DATA TRACE . Their combination contributes together with the statement Aut A,X on evidence ISOLATION [52]. However, even though if a data trace between nodes or a node itself is faulty, a data trace of another information exchange might be acceptable correct.…”
Section: Iris: User-centered It Risk Analyticsmentioning
confidence: 99%
“…The former evaluation results in evidence INFOR-MATION ; the evaluation of the workflow instance results in evidence DATA TRACE . Their combination contributes together with the statement Aut A,X on evidence ISOLATION [52]. However, even though if a data trace between nodes or a node itself is faulty, a data trace of another information exchange might be acceptable correct.…”
Section: Iris: User-centered It Risk Analyticsmentioning
confidence: 99%