• DocumentCode
    567189
  • Title

    Bayesian networks for modeling failure dependency in access control models

  • Author

    Alaboodi, Saad Saleh ; Agnew, Gordon B.

  • Author_Institution
    Electr. & Comput. Eng. Dept., Univ. of Waterloo, Waterloo, ON, Canada
  • fYear
    2012
  • fDate
    10-12 June 2012
  • Firstpage
    176
  • Lastpage
    182
  • Abstract
    Access controls are indispensable mechanisms for protecting access to resources of computing and communication systems. Currently, the design of access control models is centered on the access interaction between system subjects and objects. However, access authentication, control, auditing and administration services in today´s systems do not enjoy full operational independence while interacting with systems assets. That is, in a way or another they interact across different platforms, programs, processes or users, leading to build certain dependency while in operation. The identification and evaluation of this dependency is crucial to meeting security goals of access control models. To tackle this issue, we introduce a modeling technique that captures probabilistically the interaction between system assets and controls into a graph theoretic paradigm. We use Bayesian Networks (BN) in particular to model and analyze this dependency. We briefly show the proposed abstraction, modeling formalism and associated notation, along with a demonstration example of various useful inferences and some suggested research directions.
  • Keywords
    authorisation; belief networks; graph theory; inference mechanisms; probability; resource allocation; BN; Bayesian networks; abstraction; access administration services; access auditing; access authentication; access control models; access interaction probability; communication system resource access protection; computing system resource access protection; failure dependency evaluation; failure dependency identification; failure dependency modeling; graph theory; inference mechanisms; system assets; system objects; system subjects; Access control; Analytical models; Bayesian methods; Computational modeling; Databases; Fires; access control modeling; asset-control Bayesian network; asset-control graph; object-right relationship; security engineering;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Internet Security (WorldCIS), 2012 World Congress on
  • Conference_Location
    Guelph, ON
  • Print_ISBN
    978-1-4673-1108-3
  • Type

    conf

  • Filename
    6280223