Obligations in Risk-Aware Access Control

Liang Chen, Jason Crampton, Martin J Kollingbaum, Timothy J Norman

Research output: Chapter in Book/Report/Conference proceedingPublished conference contribution

22 Citations (Scopus)

Abstract

The increasing need to share information in dynamic environments has created a requirement for risk-aware access control systems. In this paper, we present a metamodel for risk-aware authorization that captures the key aspects of a system in relation to risk mitigation. In particular, we develop various risk-aware models as instances of the metamodel that broadly differ in the form of risk mitigation that is used (system obligations and user obligations respectively), and study how those obligations are applied to reduce and account for the risk incurred by granting access. Unlike system obligations, an access control system cannot guarantee that user obligations are fulfilled. We propose two approaches to defining risk-aware authorization semantics that takes unfulfilled obligations into account: one is to restrict users' future access because of prior failure to fulfill obligations, and the other is to “reward” users who have been diligent in fulfilling their obligations by permitting risky access requests.
Original languageEnglish
Title of host publication2012 Tenth Annual International Conference on Privacy, Security and Trust
Subtitle of host publicationInstitut Mines-Telecom, Paris, France, July 16-18, 2012
Place of PublicationWashington DC, USA
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages145-152
Number of pages8
ISBN (Electronic)9781467323253
ISBN (Print)9781467323239
DOIs
Publication statusPublished - 2012
EventProceedings of the Tenth Annual Conference on Privacy, Security and Trust - Paris, France
Duration: 16 Jul 201218 Jul 2012

Conference

ConferenceProceedings of the Tenth Annual Conference on Privacy, Security and Trust
Country/TerritoryFrance
CityParis
Period16/07/1218/07/12

Keywords

  • authorization
  • semantics
  • context

Fingerprint

Dive into the research topics of 'Obligations in Risk-Aware Access Control'. Together they form a unique fingerprint.

Cite this