Cart (Loading....) | Create Account
Close category search window
 

An Access Control Architecture for Context-Risk-Aware Access Control: Architectural Design and Performance Evaluation

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Ahmed, A. ; Sch. of Comput. Sci., Univ. of Manchester, Manchester, UK ; Ning Zhang

Risk assessment plays a significant role in Decision Support Systems (DSS). Recently, there have been efforts to exploit the potential of linking risk assessment to security provisioning to provide risk-aware security services. One of these efforts is the Context-Risk-Aware Access Control (CRAAC) model that links requesters' access privileges to the risk level in the underlying access environment in the context of Pervasive Computing (PerComp). The idea is to link an access control decision to an attribute value that reflects the aggregated assurance level in identifying a subject. This attribute value is named as Requester's Level of Assurance (RLoA) and is influenced by the requester's run-time contextual information. This paper proposes the CRAAC architecture along with its components to support this novel access control model. This architecture provides high level functional transparency, extensibility, and flexibility to cope with the PerComp dynamic nature. It describes the fundamental services provided by CRAAC, namely context monitoring, RLoA derivation, and RLoA-linked access control decision making. The paper also shows the results of some experiments, conducted on a CRAAC prototype, to evaluate the CRAAC performance (configured in the RLoA-only working mode). The experimental results show that the RLoA-only mode introduces only marginal access delays and is more resilient to Denial of Service (DoS) attacks compared to the traditional Role-Based Access Control (RBAC) model.

Published in:

Emerging Security Information Systems and Technologies (SECURWARE), 2010 Fourth International Conference on

Date of Conference:

18-25 July 2010

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.