scispace - formally typeset
Proceedings ArticleDOI

Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control

TLDR
A new model for adaptive, risk-based access control is presented, more like a fuzzy logic control system than a traditional access control system and hence the name "fuzzy MLS".
Abstract
This paper presents a new model for, or rather a new way of thinking about adaptive, risk-based access control. Our basic premise is that there is always inherent uncertainty and risk in access control decisions that is best addressed in an explicit way. We illustrate this concept by showing how the rationale of the well-known, Bell-Lapadula model based, multi-level security (MLS) access control model could be used to develop a risk-adaptive access control model. This new model is more like a fuzzy logic control system than a traditional access control system and hence the name "fuzzy MLS". The long version of this paper is published as an IBM Research Report.

read more

Citations
More filters
Journal Article

Big Data Security and Privacy Protection

TL;DR: It is argued that big data brings not only challenges, but also technical revolution in the field of information security, and the key technologies which can be exploited to deal with these challenges are described.
Proceedings ArticleDOI

CASA: context-aware scalable authentication

TL;DR: The results suggest that location data has good potential as a passive factor, and that users can reduce up to 68% of active authentications when using an implementation of CASA, compared to always using fixed active authentication.
Proceedings ArticleDOI

XenSocket: a high-throughput interdomain transport for virtual machines

TL;DR: The design and implementation of XenSocket is presented, a UNIX-domain-socket-like construct for high-throughput in-terdomain (VM-to-VM) communication on the same system and draws on best-practice work in this field.
Journal ArticleDOI

An access control model for cloud computing

TL;DR: The proposed access control model can not only ensure the secure sharing of resources among potential untrusted tenants, but also has the capacity to support different access permission to the same cloud user and gives him/her the ability to use multiple services securely.
Proceedings ArticleDOI

Risk-based adaptive security for smart IoT in eHealth

TL;DR: A risk-based adaptive security framework for IoTs in eHealth that will estimate and predict risk damages and future benefits using game theory and context-awareness techniques is described.
References
More filters
Book ChapterDOI

The use of knowledge in society

TL;DR: In this paper, it was pointed out that many of the current disputes with regard to both economic theory and economic policy have their common origin, it seems to me, in a misconception about the nature of the economic problem of society.
Book

Neuro-Fuzzy and Soft Computing: A Computational Approach to Learning and Machine Intelligence

TL;DR: This text provides a comprehensive treatment of the methodologies underlying neuro-fuzzy and soft computing with equal emphasis on theoretical aspects of covered methodologies, empirical observations, and verifications of various applications in practice.
Journal ArticleDOI

Neuro-Fuzzy and Soft Computing-A Computational Approach to Learning and Machine Intelligence [Book Review]

TL;DR: Interestingly, neuro fuzzy and soft computing a computational approach to learning and machine intelligence that you really wait for now is coming.
Journal ArticleDOI

The use of knowledge about society

TL;DR: In this article, the authors argue that political competition fails to inform constituents of the costs of forgone political alternatives, which prevents the adoption of welfare enhancing reforms of public institutions and policies.
Journal ArticleDOI

A lattice model of secure information flow

TL;DR: The model provides a unifying view of all systems that restrict information flow, enables a classification of them according to security objectives, and suggests some new approaches to formulating the requirements of secure information flow among security classes.