Title | ||
---|---|---|
Generation of Transmission Control Rules Compliant with Existing Access Control Policies. |
Abstract | ||
---|---|---|
Access Control (AC) is a well known mechanism that allows access restriction to resources. Nevertheless, it does not provide notification when a resource is retransmitted to an unauthorized third party. To overcome this issue, one can use mechanisms such as Data Loss/Leak Prevention (DLP) or Transmission Control (TC). These mechanisms are based on policies that are defined by security experts. Unfortunately, these policies can contradict existing AC rules, leading to security leakage (i.e. a legitimate user is allowed to send a resource to someone who has no access rights in the AC). |
Year | Venue | Field |
---|---|---|
2015 | SecureComm | Transmission (mechanics),Data loss,Information security standards,Transmission security,Computer security,Computer science,Computer network,Third party,Access control,Security policy,Computer security model |
DocType | Citations | PageRank |
Conference | 1 | 0.35 |
References | Authors | |
8 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Yoann Bertrand | 1 | 1 | 0.35 |
Mireille Blay-Fornarino | 2 | 17 | 3.50 |
Karima Boudaoud | 3 | 130 | 13.08 |
michel riveill | 4 | 398 | 54.88 |