posed of three distributed and chained subsystems and
an orchestrator module. The proposal aims to evalu-
ate risks related to three vulnerable zones of the e-
health system: devices landscape, network part and
storage infrastructure. Ongoing work deals with the
formalization of the approach and setting up the in-
teractions between the different subsystems.
REFERENCES
Akinrolabu, O., New, S., and Martin, A. (2019). Csccra:
A novel quantitative risk assessment model for saas
cloud service providers. Computers, 8(3):66.
Caralli, R. A., Stevens, J. F., Young, L. R., and Wilson,
W. R. (2007). Improving the information security risk
assessment process–.
Chakraborty, S. and Ray, I. (2006). Trustbac: integrating
trust relationships into the rbac model for access con-
trol in open systems. In Proceedings of the eleventh
ACM symposium on Access control models and tech-
nologies, pages 49–58.
Chen, L. and Crampton, J. (2011). Risk-aware role-based
access control. In International Workshop on Security
and Trust Management, pages 140–156. Springer.
CMMI (2017). What is capability maturity model inte-
gration (cmmi). http://cmmiinstitute.com/capability-
maturity-model-integration. Accessed: 2020-04-30.
CVSS (2018). Common vulnerability scoring system sig.
https://www.first.org/cvss/. Accessed: 2020-04-30.
Evina, P. A., Ayachi, F. L., Jaidi, F., and Bouhoula, A.
(2018). Anomalies correlation for risk-aware access
control enhancement. In ENASE, pages 299–304.
FAIR (2017). Quantitative information risk management -
the fair institute, factor analysis of information risk.
http://www.fairinstitute.org. Accessed: 2020-04-30.
Feng, F., Lin, C., Peng, D., and Li, J. (2008). A trust and
context based access control model for distributed sys-
tems. In 2008 10th IEEE International Conference on
High Performance Computing and Communications,
pages 629–634. IEEE.
Force, J. T. (2018). Risk management framework for in-
formation systems and organizations. NIST Special
Publication, 800:37.
Gligor, V. D., Gavrila, S. I., and Ferraiolo, D. (1998). On the
formal definition of separation-of-duty policies and
their composition. In Proceedings. 1998 IEEE Sympo-
sium on Security and Privacy (Cat. No. 98CB36186),
pages 172–183. IEEE.
ISO (2009). Risk Management: Principles and Guidelines.
International Standardization Organization.
Jaeger, T. (1999). On the increasing importance of con-
straints. In Proceedings of the fourth ACM workshop
on Role-based access control, pages 33–42.
Ja
¨
ıdi, F., Labbene-Ayachi, F., and Bouhoula, A. (2016). Ad-
vanced techniques for deploying reliable and efficient
access control: Application to e-healthcare. Journal
of medical systems, 40(12):262.
Ja
¨
ıdi, F., Labbene Ayachi, F., and Bouhoula, A. (2018). A
methodology and toolkit for deploying reliable secu-
rity policies in critical infrastructures. Security and
Communication Networks, 2018.
Ma, J., Adi, K., Mejri, M., and Logrippo, L. (2010). Risk
analysis in access control systems. In 2010 Eighth
International Conference on Privacy, Security and
Trust, pages 160–166. IEEE.
Malik, V. and Singh, S. (2019). Security risk management
in iot environment. Journal of Discrete Mathematical
Sciences and Cryptography, 22(4):697–709.
Molloy, I., Dickens, L., Morisset, C., Cheng, P.-C., Lobo, J.,
and Russo, A. (2012). Risk-based security decisions
under uncertainty. In Proceedings of the second ACM
conference on Data and Application Security and Pri-
vacy, pages 157–168.
Ni, Q., Bertino, E., and Lobo, J. (2010). Risk-based access
control systems built on fuzzy inferences. In Proceed-
ings of the 5th ACM Symposium on Information, Com-
puter and Communications Security, pages 250–260.
Nurse, J. R., Creese, S., and De Roure, D. (2017). Secu-
rity risk assessment in internet of things systems. IT
professional, 19(5):20–26.
Radanliev, P., De Roure, D. C., Nicolescu, R., Huth, M.,
Montalvo, R. M., Cannady, S., and Burnap, P. (2018).
Future developments in cyber risk assessment for the
internet of things. Computers in Industry, 102:14–22.
Radanliev, P., De Roure, D. C., Nurse, J. R., Burnap, P.,
Anthi, E., Uchenna, A., Santos, O., Montalvo, R. M.,
et al. (2019). Cyber risk management for the internet
of things.
Research, M. (2019). Internet of things (iot)
in healthcare market - global opportunity
analysis and industry forecast (2018-2025).
https://meticulousresearch.com/product/healthcare-
iot-market/. Accessed: 2020-04-30.
RiskLens (2017). Risk analytics platform, fair platform
management. https://www.risklens.com/platform.
Accessed: 2020-04-30.
Sanna, N. N. (2016). What is a cyber value-at-risk
model? www.fairinstitute.org/blog/what-is-a-cyber-
value-at-risk-model. Accessed: 2020-04-30.
Shaw, R., Takanti, V., Zullo, T., Director, M., and Llc,
E. (2017). Best practices in cyber supply chain risk
management boeing and exostar cyber security supply
chain risk management interviews.
Simon, R. T. and Zurko, M. E. (1997). Separation of duty in
role-based environments. In Proceedings 10th Com-
puter Security Foundations Workshop, pages 183–
194. IEEE.
Wynn, J., Whitmore, J., Upton, G., Spriggs, L., McKin-
non, D., McInnes, R., Graubart, R., and Clausen, L.
(2011). Threat assessment & remediation analysis
(tara): Methodology description version 1.0. Tech-
nical report, MITRE CORP BEDFORD MA.
A Comprehensive Quantified Approach for Security Risk Management in e-Health Systems
657