Data-driven Chinese walls

Gulsum Akkuzu, Benjamin Aziz

Research output: Chapter in Book/Report/Conference proceedingConference contribution

80 Downloads (Pure)

Abstract

Security policy and access control models are often based on qualitative attributes, e.g. security labels, cryptographic credentials. In this paper, we enrich one such model, namely the Chinese Walls model, with quantitative attributes derived from data. Therefore, we advocate a data-driven approach that considers a quantitative definition of access we term, working relations.
Original languageEnglish
Title of host publication2018 Imperial College Computing Student Workshop (ICCSW 2018)
PublisherSchloss Dagstuhl – Leibniz Center for Informatics
Pages3:1-3:8
Number of pages8
Volume66
ISBN (Electronic)978-3-95977-097-2
DOIs
Publication statusPublished - 20 Sept 2018
Event2018 Imperial College Computing Student Workshop - London, United Kingdom
Duration: 20 Sept 201821 Sept 2018
http://iccsw.doc.ic.ac.uk/2018/

Publication series

NameOpenAccess Series in Informatics
PublisherSchloss Dagstuhl – Leibniz Center for Informatics
ISSN (Print)2190-6807

Workshop

Workshop2018 Imperial College Computing Student Workshop
Country/TerritoryUnited Kingdom
CityLondon
Period20/09/1821/09/18
Internet address

Keywords

  • Data analysis
  • Access Control
  • Security
  • Chinese Walls

Fingerprint

Dive into the research topics of 'Data-driven Chinese walls'. Together they form a unique fingerprint.

Cite this