Please use this identifier to cite or link to this item: http://hdl.handle.net/10773/18236
Full metadata record
DC FieldValueLanguage
dc.contributor.authorRegateiro, Diogo Dominguespt
dc.contributor.authorPereira, Óscar Mortáguapt
dc.contributor.authorAguiar, Rui L.pt
dc.date.accessioned2017-08-22T10:52:10Z-
dc.date.issued2017-
dc.identifier.isbn978-989-758-259-2-
dc.identifier.urihttp://hdl.handle.net/10773/18236-
dc.description.abstractAccess control is a vital part of any computer system. When it comes to access to data, deterministic access control models such as RBAC are still widely used today, but they lack the flexibility needed to support some recent scenarios. These include scenarios where users and data can be dynamically added to a system, which emerged from IoT and big data contexts. Such scenarios include data from network operators, smart cities, etc. Thus, models that are able to adapt to these dynamic environments are necessary. Non-deterministic access control models fall into this approach, as they introduce new ways of mapping users to permissions and resources, but lack the auditing capabilities of deterministic models. In this paper, the usage of these models will be defended and argued for. In particular, a solution based on fuzzy set theory is proposed as it is thought to be able to provide some flexibility benefits of non-deterministic models, while giving some assurance to security experts that the resources are not accessed by unexpected users.pt
dc.language.isoengpt
dc.publisherSCITEPRESSpt
dc.relationinfo:eu-repo/grantAgreement/FCT/5876/147328/PTpt
dc.relationFCT - SFRH/BD/109911/2015pt
dc.rightsrestrictedAccesspor
dc.subjectAccess controlpt
dc.subjectFuzzy set theorypt
dc.subjectDatabase and information securitypt
dc.titleOn the application of fuzzy set theory for access control enforcementpt
dc.typeconferenceObjectpt
dc.peerreviewedyespt
ua.publicationstatuspublishedpt
ua.event.date26-28 julho, 2017pt
ua.event.typeconferencept
degois.publication.firstPage540pt
degois.publication.lastPage547pt
degois.publication.titleProceedings of the 14th International Joint Conference on e-Business and Telecommunicationspt
degois.publication.volume6pt
dc.date.embargo10000-01-01-
dc.identifier.doi10.5220/0006469305400547pt
Appears in Collections:DETI - Comunicações

Files in This Item:
File Description SizeFormat 
(CP) - 2017-07-24 (SECRYPT - Madrid - Spain) On the Application of Fuzzy Set Theory for Access Control Enforcement.pdfDocumento principal375.76 kBAdobe PDFrestrictedAccess


FacebookTwitterLinkedIn
Formato BibTex MendeleyEndnote Degois 

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.