2015
DOI: 10.1007/978-3-319-17016-9_17
|View full text |Cite
|
Sign up to set email alerts
|

Risk-Aware Information Disclosure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 13 publications
0
7
0
Order By: Relevance
“…Risk reduction in access control models are obligations that are usually required to be performed in order to lower the potential impact of a risky access request (Irwin et al, 2006;Pontual et al, 2011). Risk can be reduced by several means such as utilizing anonymization techniques (Armando et al, 2015;Taneja et al, 2015;Shaden et al, 2017) for protection against potential vulnerabilities, increasing security measures of the system by increasing the length of encryption keys or imposing a set of rules and required actions. Such obligations, of which all are supervised by the system, need to be satisfied by the user before or after access is granted (Díaz-López et al, 2016).…”
Section: Risk Reduction Techniquesmentioning
confidence: 99%
“…Risk reduction in access control models are obligations that are usually required to be performed in order to lower the potential impact of a risky access request (Irwin et al, 2006;Pontual et al, 2011). Risk can be reduced by several means such as utilizing anonymization techniques (Armando et al, 2015;Taneja et al, 2015;Shaden et al, 2017) for protection against potential vulnerabilities, increasing security measures of the system by increasing the length of encryption keys or imposing a set of rules and required actions. Such obligations, of which all are supervised by the system, need to be satisfied by the user before or after access is granted (Díaz-López et al, 2016).…”
Section: Risk Reduction Techniquesmentioning
confidence: 99%
“…They then try to impose mitigation measures to counter the posed risk. As such, the systems evaluate the risk posed by a data access request, and provide it with appropriate protection measures [ 67 , 102 , 103 ]. In essence, more mitigation measures would be imposed on requests of higher sensitivity (requests for data with higher potential for injury or from requester that are not highly trusted).…”
Section: Current Practicementioning
confidence: 99%
“…In [25], anonymization using k-anonymity measure is used to mitigate the risk associated with data disclosure. In their model, the access control is enhanced with risk assessment such that the risk that can be incurred from querying a dataset is calculated and, then, lowered via returning anonymized data; which ultimately protects privacy.…”
Section: S S Alaqeeli Et Almentioning
confidence: 99%
“…In the former, risk assessment investigated the ways to assess the riskiness of an access request before granting access to the resources [17]- [21]; namely, quantifying the risk. In the latter, efforts focused on approaches and strategies that bring down the risk that has already been assessed [23] [24] [25].…”
Section: Introductionmentioning
confidence: 99%