• Published 2008

Risk Modulating Factors in Risk – Based Access Control for Information in a MANET ∗ Pau –

@inproceedings{Cheng2008RiskMF,
  title={Risk Modulating Factors in Risk – Based Access Control for Information in a MANET ∗ Pau –},
  author={Pau-Chen Cheng and Paul A. Karger},
  year={2008}
}
We present an approach for evaluating risk using risk–contributing factors. This approach could be applied recursively to a hierarchy of risk–contributing factors. We also use a MANET scenario to demonstrate how the approach may be applied. We believe that the scenario covers some of the most important risk factors regarding access control for information in a MANET. The set of risk factors discussed in this paper is by no means complete. Besides the usual technical considerations for… CONTINUE READING

Figures from this paper.

Citations

Publications citing this paper.
SHOWING 1-6 OF 6 CITATIONS

Research on the quantification method of the operational need based on access purpose and exponential smoothing

  • Yong-jian Yang, Shuai Liu
  • Computer Science
  • 2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference
  • 2014
VIEW 1 EXCERPT

Learning Autonomic Security Reconfiguration Policies

VIEW 1 EXCERPT
CITES BACKGROUND

Risk based access control with uncertain and time-dependent sensitivity

Dynamic security policy learning

VIEW 1 EXCERPT
CITES METHODS

References

Publications referenced by this paper.
SHOWING 1-10 OF 61 REFERENCES

Internet Key Exchange (IKEv2) Protocol

  • C. Kaufman editor
  • IETF RFC
  • 2005
VIEW 7 EXCERPTS
HIGHLY INFLUENTIAL

An architecture for the Internet Key Exchange Protocol

  • Pau-Chen Cheng
  • IBM System Journal,
  • 2001
VIEW 7 EXCERPTS
HIGHLY INFLUENTIAL

The Internet Key Exchange (IKE)

VIEW 7 EXCERPTS
HIGHLY INFLUENTIAL

Risk profiles and distributed risk assessment

VIEW 1 EXCERPT

A Mechanism for Risk AdaptiveAccess Control (RAdAC)

  • Machon Gregory
  • National Information Assurance Research Laboratory (NIARL), March 2007. http://www.nsa.gov/selinux/papers/radac07.pdf
  • 2007

Combining Evidence to Build Trust. In Workshop on Web 2.0 Security and Privacy 2007, Held in conjunction with the 2007

  • Johannes Helander, Benjamin Zorn. Medina
  • IEEE Symposium on Security and Privacy. http://seclab.cs.rice.edu/w2sp/2007/papers/paper-183-z 2465.pdf and slides
  • 2007
VIEW 1 EXCERPT

Cryptanalysis of the Windows Random Number Generator

  • Leo Dorrendorf, Benny Pinkas
  • In Proceedings of the 14th ACM Conference on Computer and Communication Security (CCS
  • 2007
VIEW 1 EXCERPT