2016
DOI: 10.1007/978-3-319-48057-2_20
|View full text |Cite
|
Sign up to set email alerts
|

Trust and Risk-Based Access Control for Privacy Preserving Threat Detection Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…Metoui et al [49] and Metoui et al [52] The paper [49] proposed a risk-aware framework that combines the privacy risk with the user trust to identify threats related to each access request. The access decision is determined by comparing the privacy-risk with the user trust in which if the user trust is higher than the privacy risk, the access will be granted.…”
Section: Dos Santos Et Al [1] and Dos Santos Et Al [22]mentioning
confidence: 99%
“…Metoui et al [49] and Metoui et al [52] The paper [49] proposed a risk-aware framework that combines the privacy risk with the user trust to identify threats related to each access request. The access decision is determined by comparing the privacy-risk with the user trust in which if the user trust is higher than the privacy risk, the access will be granted.…”
Section: Dos Santos Et Al [1] and Dos Santos Et Al [22]mentioning
confidence: 99%
“…The problem of this approach is that it requires an additional resource the cryptographic coprocessor and that the processing entity is a trusted user. In [9] the authors propose a trust-and risk-aware access control framework for Threat Detection Systems, where each access request is evaluated by comparing the privacy-risk and the trustworthiness of the request. In [10], many techniques are investigated, including secure multiparty computation, and homomorphic encryption as possible solution for the privacy aware image processing in a cloud environment.…”
Section: Related Workmentioning
confidence: 99%
“…The implementation of an access control model can be manipulated in a variety of ways, ranging from an unforeseen situation involving poorly designed access policies to malicious entities gaining access to a group of existing accounts. As a result, traditional access control models, which are based on static and predefined policies, cannot manage unanticipated scenarios and situations [1]. As a result, they are incompatible with a dynamic and distributed system like the IoT.…”
Section: Introductionmentioning
confidence: 99%