loading
Papers

Research.Publish.Connect.

Paper

Authors: Diogo Domingues Regateiro ; Óscar Mortágua Pereira and Rui L. Aguiar

Affiliation: DETI and Universidade de Aveiro, Portugal

ISBN: 978-989-758-259-2

Keyword(s): Access Control, Fuzzy Set Theory, Database and Information Security.

Related Ontology Subjects/Areas/Topics: Access Control ; Data and Application Security and Privacy ; Data Engineering ; Data Protection ; Databases and Data Security ; Information and Systems Security ; Information Assurance ; Internet Technology ; Organizational Security Policies ; Web Information Systems and Technologies

Abstract: Access control is a vital part of any computer system. When it comes to access to data, deterministic access control models such as RBAC are still widely used today, but they lack the flexibility needed to support some recent scenarios. These include scenarios where users and data can be dynamically added to a system, which emerged from IoT and big data contexts. Such scenarios include data from network operators, smart cities, etc. Thus, models that are able to adapt to these dynamic environments are necessary. Non-deterministic access control models fall into this approach, as they introduce new ways of mapping users to permissions and resources, but lack the auditing capabilities of deterministic models. In this paper, the usage of these models will be defended and argued for. In particular, a solution based on fuzzy set theory is proposed as it is thought to be able to provide some flexibility benefits of non-deterministic models, while giving some assurance to security e xperts that the resources are not accessed by unexpected users. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 34.225.194.144

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Domingues Regateiro, D.; Mortágua Pereira, Ó. and L. Aguiar, R. (2017). On the Application of Fuzzy Set Theory for Access Control Enforcement.In Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2017) ISBN 978-989-758-259-2, pages 540-547. DOI: 10.5220/0006469305400547

@conference{secrypt17,
author={Diogo Domingues Regateiro. and Óscar Mortágua Pereira. and Rui L. Aguiar.},
title={On the Application of Fuzzy Set Theory for Access Control Enforcement},
booktitle={Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2017)},
year={2017},
pages={540-547},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006469305400547},
isbn={978-989-758-259-2},
}

TY - CONF

JO - Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2017)
TI - On the Application of Fuzzy Set Theory for Access Control Enforcement
SN - 978-989-758-259-2
AU - Domingues Regateiro, D.
AU - Mortágua Pereira, Ó.
AU - L. Aguiar, R.
PY - 2017
SP - 540
EP - 547
DO - 10.5220/0006469305400547

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.