TRAAC: Trust and Risk Aware Access Control

Christopher Burnett, Liang Chen, Peter Edwards, Timothy James Forester Norman

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)
8 Downloads (Pure)

Abstract

Systems for allowing users to manage access to their personal data are important for a wide variety of applications including healthcare, where authorised individuals may need to share information in ways that the owner had not anticipated. Simply denying access in unknown cases may hamper critical decisions and affect service delivery. Rather, decisions can be made considering the risk of a given sharing request, and the trustworthiness of the requester. We propose a trust- and risk-aware access control mechanism (TRAAC) and a sparse zone-based policy model, which together allow decision-making on the basis of the requester's trustworthiness with regards to both the information to be shared, and the completion of obligations designed to mitigate risk. We formalise our approach and compare it with an existing approach that does not model trust through simulation.
Original languageEnglish
Title of host publicationProceedings of Twelfth Annual International Conference on Privacy, Security and Trust (PST), 2014
EditorsAli Miri, Urs Hengartner, Nen-Fu Huang, Audun Josang, Joaquin Garcia-Alfaro
PublisherIEEE Press
Pages371-378
Number of pages8
ISBN (Print)978-1-4799-3502-4
DOIs
Publication statusPublished - 2014

Fingerprint

Access control
Data privacy
Decision making

Keywords

  • access control
  • personal data
  • zone-based policy
  • trust
  • risk

Cite this

Burnett, C., Chen, L., Edwards, P., & Norman, T. J. F. (2014). TRAAC: Trust and Risk Aware Access Control. In A. Miri, U. Hengartner, N-F. Huang, A. Josang, & J. Garcia-Alfaro (Eds.), Proceedings of Twelfth Annual International Conference on Privacy, Security and Trust (PST), 2014 (pp. 371-378). IEEE Press. https://doi.org/10.1109/PST.2014.6890962

TRAAC: Trust and Risk Aware Access Control. / Burnett, Christopher; Chen, Liang; Edwards, Peter; Norman, Timothy James Forester.

Proceedings of Twelfth Annual International Conference on Privacy, Security and Trust (PST), 2014 . ed. / Ali Miri; Urs Hengartner; Nen-Fu Huang; Audun Josang; Joaquin Garcia-Alfaro. IEEE Press, 2014. p. 371-378.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Burnett, C, Chen, L, Edwards, P & Norman, TJF 2014, TRAAC: Trust and Risk Aware Access Control. in A Miri, U Hengartner, N-F Huang, A Josang & J Garcia-Alfaro (eds), Proceedings of Twelfth Annual International Conference on Privacy, Security and Trust (PST), 2014 . IEEE Press, pp. 371-378. https://doi.org/10.1109/PST.2014.6890962
Burnett C, Chen L, Edwards P, Norman TJF. TRAAC: Trust and Risk Aware Access Control. In Miri A, Hengartner U, Huang N-F, Josang A, Garcia-Alfaro J, editors, Proceedings of Twelfth Annual International Conference on Privacy, Security and Trust (PST), 2014 . IEEE Press. 2014. p. 371-378 https://doi.org/10.1109/PST.2014.6890962
Burnett, Christopher ; Chen, Liang ; Edwards, Peter ; Norman, Timothy James Forester. / TRAAC: Trust and Risk Aware Access Control. Proceedings of Twelfth Annual International Conference on Privacy, Security and Trust (PST), 2014 . editor / Ali Miri ; Urs Hengartner ; Nen-Fu Huang ; Audun Josang ; Joaquin Garcia-Alfaro. IEEE Press, 2014. pp. 371-378
@inproceedings{dc75d93ced194de0886b26ab6a602e7b,
title = "TRAAC: Trust and Risk Aware Access Control",
abstract = "Systems for allowing users to manage access to their personal data are important for a wide variety of applications including healthcare, where authorised individuals may need to share information in ways that the owner had not anticipated. Simply denying access in unknown cases may hamper critical decisions and affect service delivery. Rather, decisions can be made considering the risk of a given sharing request, and the trustworthiness of the requester. We propose a trust- and risk-aware access control mechanism (TRAAC) and a sparse zone-based policy model, which together allow decision-making on the basis of the requester's trustworthiness with regards to both the information to be shared, and the completion of obligations designed to mitigate risk. We formalise our approach and compare it with an existing approach that does not model trust through simulation.",
keywords = "access control, personal data, zone-based policy, trust, risk",
author = "Christopher Burnett and Liang Chen and Peter Edwards and Norman, {Timothy James Forester}",
year = "2014",
doi = "10.1109/PST.2014.6890962",
language = "English",
isbn = "978-1-4799-3502-4",
pages = "371--378",
editor = "Ali Miri and Urs Hengartner and Nen-Fu Huang and Audun Josang and Joaquin Garcia-Alfaro",
booktitle = "Proceedings of Twelfth Annual International Conference on Privacy, Security and Trust (PST), 2014",
publisher = "IEEE Press",

}

TY - GEN

T1 - TRAAC: Trust and Risk Aware Access Control

AU - Burnett, Christopher

AU - Chen, Liang

AU - Edwards, Peter

AU - Norman, Timothy James Forester

PY - 2014

Y1 - 2014

N2 - Systems for allowing users to manage access to their personal data are important for a wide variety of applications including healthcare, where authorised individuals may need to share information in ways that the owner had not anticipated. Simply denying access in unknown cases may hamper critical decisions and affect service delivery. Rather, decisions can be made considering the risk of a given sharing request, and the trustworthiness of the requester. We propose a trust- and risk-aware access control mechanism (TRAAC) and a sparse zone-based policy model, which together allow decision-making on the basis of the requester's trustworthiness with regards to both the information to be shared, and the completion of obligations designed to mitigate risk. We formalise our approach and compare it with an existing approach that does not model trust through simulation.

AB - Systems for allowing users to manage access to their personal data are important for a wide variety of applications including healthcare, where authorised individuals may need to share information in ways that the owner had not anticipated. Simply denying access in unknown cases may hamper critical decisions and affect service delivery. Rather, decisions can be made considering the risk of a given sharing request, and the trustworthiness of the requester. We propose a trust- and risk-aware access control mechanism (TRAAC) and a sparse zone-based policy model, which together allow decision-making on the basis of the requester's trustworthiness with regards to both the information to be shared, and the completion of obligations designed to mitigate risk. We formalise our approach and compare it with an existing approach that does not model trust through simulation.

KW - access control

KW - personal data

KW - zone-based policy

KW - trust

KW - risk

U2 - 10.1109/PST.2014.6890962

DO - 10.1109/PST.2014.6890962

M3 - Conference contribution

SN - 978-1-4799-3502-4

SP - 371

EP - 378

BT - Proceedings of Twelfth Annual International Conference on Privacy, Security and Trust (PST), 2014

A2 - Miri, Ali

A2 - Hengartner, Urs

A2 - Huang, Nen-Fu

A2 - Josang, Audun

A2 - Garcia-Alfaro, Joaquin

PB - IEEE Press

ER -