INTERACTIVITY FOR REACTIVE ACCESS CONTROL

Yehia ElRakaiby, Frederic Cuppens, Nora Cuppens-Boulahia

2008

Abstract

Technological advances enhanced the computing and communication capabilities of electronic devices bringing us new pervasive environments where information is present everywhere and can be accessed from anywhere. These environments made way to new intelligent and context-aware applications which have more sophisticated access control requirements. So far, there have been two main categories of access control systems: passive security systems which evaluate access requests according to static predefined permissions; and dynamic security systems which integrate the context in the evaluation of access requests. These models can thus be justly classified as anticipative models since all security rules have to be completely defined before an access request is made. In this paper, we present a formal access control model that extends context-based models to allow just-in-time specification of access control policies. The model relies on interactivity to support active participation of users in the evaluation of the security policy, thus enabling them to participate in the definition of the access policy at the time of the request.

Download


Paper Citation


in Harvard Style

ElRakaiby Y., Cuppens F. and Cuppens-Boulahia N. (2008). INTERACTIVITY FOR REACTIVE ACCESS CONTROL . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008) ISBN 978-989-8111-59-3, pages 57-64. DOI: 10.5220/0001924900570064

in Bibtex Style

@conference{secrypt08,
author={Yehia ElRakaiby and Frederic Cuppens and Nora Cuppens-Boulahia},
title={INTERACTIVITY FOR REACTIVE ACCESS CONTROL},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)},
year={2008},
pages={57-64},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001924900570064},
isbn={978-989-8111-59-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)
TI - INTERACTIVITY FOR REACTIVE ACCESS CONTROL
SN - 978-989-8111-59-3
AU - ElRakaiby Y.
AU - Cuppens F.
AU - Cuppens-Boulahia N.
PY - 2008
SP - 57
EP - 64
DO - 10.5220/0001924900570064