首页 | 本学科首页   官方微博 | 高级检索  
     


Adapting usage control as a deterrent to address the inadequacies of access controls
Authors:Keshnee  JHP  
Affiliation:aUniversity of South Africa, School of Computing, PO Box 392, Unisa, Pretoria, Gauteng 0003, South Africa;bInformation & Computer Security Architectures Research Group, Department of Computer Science, University of Pretoria, Pretoria 0002, South Africa
Abstract:Access controls are difficult to implement and evidently deficient under certain conditions. Traditional controls offer no protection for unclassified information, such as a telephone list of employees that is unrestricted, yet available only to members of the company. On the opposing side of the continuum, organizations such as hospitals that manage highly sensitive information require stricter access control measures. Yet, traditional access control may well have inadvertent consequences in such a context. Often, in unpredictable circumstances, users that are denied access could have prevented a calamity had they been allowed access. It has been proposed that controls such as auditing and accountability policies be enforced to deter rather than prevent unauthorized usage. In dynamic environments preconfigured access control policies may change dramatically depending on the context. Moreover, the cost of implementing and maintaining complex preconfigured access control policies sometimes far outweighs the benefits. This paper considers an adaptation of usage control as a proactive means of deterrence control to protect information that cannot be adequately or reasonably protected by access control.
Keywords:Usage Control  Optimistic Access Control  Deterrent Control  Access Control  Aspect-Oriented Programming
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号