Adapting usage control as a deterrent to address the inadequacies of access controls

Show simple item record

dc.contributor.author Padayachee, Keshnee
dc.contributor.author Eloff, Jan H.P.
dc.date.accessioned 2009-11-03T07:42:40Z
dc.date.available 2009-11-03T07:42:40Z
dc.date.issued 2009
dc.description.abstract Access controls are difficult to implement and evidently deficient under certain conditions. Traditional controls offer no protection for unclassified information, such as a telephone list of employees that is unrestricted, yet available only to members of the company. On the opposing side of the continuum, organizations such as hospitals that manage highly sensitive information require stricter access control measures. Yet, traditional access control may well have inadvertent consequences in such a context. Often, in unpredictable circumstances, users that are denied access could have prevented a calamity had they been allowed access. It has been proposed that controls such as auditing and accountability policies be enforced to deter rather than prevent unauthorized usage. In dynamic environments preconfigured access control policies may change dramatically depending on the context. Moreover, the cost of implementing and maintaining complex preconfigured access control policies sometimes far outweighs the benefits. This paper considers an adaptation of usage control as a proactive means of deterrence control to protect information that cannot be adequately or reasonably protected by access control. en_US
dc.identifier.citation Padayachee, K & Eloff, JHP, Adapting usage control as a deterrent to address the inadequacies of access controls, Computers & Security (2009), doi: 10.1016/j.cose.2009.03.003 en_US
dc.identifier.issn 0167-4048
dc.identifier.other 10.1016/j.cose.2009.03.003
dc.identifier.uri http://hdl.handle.net/2263/11681
dc.language.iso en en_US
dc.publisher Elsevier en_US
dc.rights Elsevier en_US
dc.subject Usage control en
dc.subject Optimistic access control en
dc.subject Deterrent control en
dc.subject Access control en
dc.subject.lcsh Information storage and retrieval systems -- Access control en
dc.subject.lcsh Aspect-oriented programming en
dc.title Adapting usage control as a deterrent to address the inadequacies of access controls en_US
dc.type Postprint Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record