Istituto di Informatica e Telematica     
Krautsevich L., Lazouski A., Martinelli F., Mori P., Yautsiukhin A. Integration of Quantitative Methods for Risk Evaluation within Usage Control Policies. In: International Conference on Computer Communications and Networks (Nassau, 2013). Proceedings, pp. 1 - 8. IEEE, 2013.
Usage Control (UCON) enhances traditional access control introducing mutable attributes and continuous policy enforcement. UCON addresses security requirements of dynamic computer environments like Grid and Cloud, but also raises new challenges. This paper considers two problems of usage control.The first problem arises when a value of a mutable attribute required for an access decision is uncertain. The second problem questions when to retrieve fresh values of mutable attributes and to trigger the access reevaluation during the continuous control. We propose quantitative risk-based methods to tackle these problems. The authorization system grants the access if the security policy is satisfied and the risk level is acceptable. The authorization system retrieves fresh attribute values following the strategy which minimises the risk of the usage sessions. We integrate the authorization system based on the U-XACML language with quantitative methods for risk evaluation. We present the architecture, the implementation, and the evaluation of the overhead posed by the risk computation.
Subject omputer network security
K.6.5 Security and protection

Icona documento 1) Download Document PDF

Icona documento Open access Icona documento Restricted Icona documento Private


Per ulteriori informazioni, contattare: Librarian http://puma.isti.cnr.it

Valid HTML 4.0 Transitional