On the Application of Fuzzy Set Theory for Access Control Enforcement

Diogo Domingues Regateiro, Óscar Mortágua Pereira, Rui L. Aguiar

2017

Abstract

Access control is a vital part of any computer system. When it comes to access to data, deterministic access control models such as RBAC are still widely used today, but they lack the flexibility needed to support some recent scenarios. These include scenarios where users and data can be dynamically added to a system, which emerged from IoT and big data contexts. Such scenarios include data from network operators, smart cities, etc. Thus, models that are able to adapt to these dynamic environments are necessary. Non-deterministic access control models fall into this approach, as they introduce new ways of mapping users to permissions and resources, but lack the auditing capabilities of deterministic models. In this paper, the usage of these models will be defended and argued for. In particular, a solution based on fuzzy set theory is proposed as it is thought to be able to provide some flexibility benefits of non-deterministic models, while giving some assurance to security experts that the resources are not accessed by unexpected users.

Download


Paper Citation


in Harvard Style

Domingues Regateiro D., Mortágua Pereira Ó. and L. Aguiar R. (2017). On the Application of Fuzzy Set Theory for Access Control Enforcement . In Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - Volume 6: SECRYPT, (ICETE 2017) ISBN 978-989-758-259-2, pages 540-547. DOI: 10.5220/0006469305400547


in Bibtex Style

@conference{secrypt17,
author={Diogo Domingues Regateiro and Óscar Mortágua Pereira and Rui L. Aguiar},
title={On the Application of Fuzzy Set Theory for Access Control Enforcement},
booktitle={Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - Volume 6: SECRYPT, (ICETE 2017)},
year={2017},
pages={540-547},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006469305400547},
isbn={978-989-758-259-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - Volume 6: SECRYPT, (ICETE 2017)
TI - On the Application of Fuzzy Set Theory for Access Control Enforcement
SN - 978-989-758-259-2
AU - Domingues Regateiro D.
AU - Mortágua Pereira Ó.
AU - L. Aguiar R.
PY - 2017
SP - 540
EP - 547
DO - 10.5220/0006469305400547