Insider threat likelihood assessment for flexible access control

1Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Users who request to access protected objects must obtain the authorization of access control systems. Among the elements of decision for such systems should be the risk of authorizing accesses under various assumptions, and one of the notions of risk is threat likelihood. Access control systems deals essentially with insider threats coming from people within the organization, such as employees, business associates or contractors, who could violate access control policies. We present in this paper a new approach for insider threat likelihood assessment for secrecy and integrity properties by considering reading and writing operations within the context of access control systems. Access operations, the trustworthiness of subjects, the sensitivity of objects, and the applied security countermeasures are all considered in the assessment of the likelihood of this category of insider threats. Both qualitative and quantitative assessments are provided. Hence our approach makes it possible to compare and calculate the likelihoods of these insider threats, leading to more flexible and more informed access control decisions in various situations.

Cite

CITATION STYLE

APA

Boulares, S., Adi, K., & Logrippo, L. (2017). Insider threat likelihood assessment for flexible access control. In Lecture Notes in Business Information Processing (Vol. 289, pp. 77–95). Springer Verlag. https://doi.org/10.1007/978-3-319-59041-7_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free