DocumentCode :
567189
Title :
Bayesian networks for modeling failure dependency in access control models
Author :
Alaboodi, Saad Saleh ; Agnew, Gordon B.
Author_Institution :
Electr. & Comput. Eng. Dept., Univ. of Waterloo, Waterloo, ON, Canada
fYear :
2012
fDate :
10-12 June 2012
Firstpage :
176
Lastpage :
182
Abstract :
Access controls are indispensable mechanisms for protecting access to resources of computing and communication systems. Currently, the design of access control models is centered on the access interaction between system subjects and objects. However, access authentication, control, auditing and administration services in today´s systems do not enjoy full operational independence while interacting with systems assets. That is, in a way or another they interact across different platforms, programs, processes or users, leading to build certain dependency while in operation. The identification and evaluation of this dependency is crucial to meeting security goals of access control models. To tackle this issue, we introduce a modeling technique that captures probabilistically the interaction between system assets and controls into a graph theoretic paradigm. We use Bayesian Networks (BN) in particular to model and analyze this dependency. We briefly show the proposed abstraction, modeling formalism and associated notation, along with a demonstration example of various useful inferences and some suggested research directions.
Keywords :
authorisation; belief networks; graph theory; inference mechanisms; probability; resource allocation; BN; Bayesian networks; abstraction; access administration services; access auditing; access authentication; access control models; access interaction probability; communication system resource access protection; computing system resource access protection; failure dependency evaluation; failure dependency identification; failure dependency modeling; graph theory; inference mechanisms; system assets; system objects; system subjects; Access control; Analytical models; Bayesian methods; Computational modeling; Databases; Fires; access control modeling; asset-control Bayesian network; asset-control graph; object-right relationship; security engineering;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Internet Security (WorldCIS), 2012 World Congress on
Conference_Location :
Guelph, ON
Print_ISBN :
978-1-4673-1108-3
Type :
conf
Filename :
6280223
Link To Document :
بازگشت