A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Cost-effective enforcement of UCONA policies
2011
2011 6th International Conference on Risks and Security of Internet and Systems (CRiSIS)
In Usage CONtrol (UCON) access decisions rely on mutable attributes. A reference monitor should re-evaluate security policies each time when attributes change their values. Catching timely all attribute changes is a challenging issue, especially if the attribute provider and the reference monitor reside in different security domains. Some attribute changes might be missed, corrupted, and delayed. As a result, the reference monitor may erroneously grant the access to malicious users and forbid
doi:10.1109/crisis.2011.6061833
dblp:conf/crisis/KrautsevichLMY11
fatcat:ojfkglpsqbbtdceb7ufljyvcci