License: Creative Commons Attribution 3.0 Unported license (CC BY 3.0)
When quoting this document, please refer to the following
DOI: 10.4230/OASIcs.ICCSW.2018.3
URN: urn:nbn:de:0030-drops-101841
URL: http://dagstuhl.sunsite.rwth-aachen.de/volltexte/2019/10184/
Go to the corresponding OASIcs Volume Portal


Akkuzu, Gulsum ; Aziz, Benjamin

Data-Driven Chinese Walls

pdf-format:
OASIcs-ICCSW-2018-3.pdf (0.4 MB)


Abstract

Security policy and access control models are often based on qualitative attributes, e.g. security labels, cryptographic credentials. In this paper, we enrich one such model, namely the Chinese Walls model, with quantitative attributes derived from data. Therefore, we advocate a data-driven approach that considers a quantitative definition of access we term, working relations.

BibTeX - Entry

@InProceedings{akkuzu_et_al:OASIcs:2019:10184,
  author =	{Gulsum Akkuzu and Benjamin Aziz},
  title =	{{Data-Driven Chinese Walls}},
  booktitle =	{2018 Imperial College Computing Student Workshop (ICCSW 2018)},
  pages =	{3:1--3:8},
  series =	{OpenAccess Series in Informatics (OASIcs)},
  ISBN =	{978-3-95977-097-2},
  ISSN =	{2190-6807},
  year =	{2019},
  volume =	{66},
  editor =	{Edoardo Pirovano and Eva Graversen},
  publisher =	{Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{http://drops.dagstuhl.de/opus/volltexte/2019/10184},
  URN =		{urn:nbn:de:0030-drops-101841},
  doi =		{10.4230/OASIcs.ICCSW.2018.3},
  annote =	{Keywords: Access Control, Big Data, Security Policies, Chinese Walls Model}
}

Keywords: Access Control, Big Data, Security Policies, Chinese Walls Model
Collection: 2018 Imperial College Computing Student Workshop (ICCSW 2018)
Issue Date: 2019
Date of publication: 25.01.2019


DROPS-Home | Fulltext Search | Imprint | Privacy Published by LZI