Title
Generation of Transmission Control Rules Compliant with Existing Access Control Policies.
Abstract
Access Control (AC) is a well known mechanism that allows access restriction to resources. Nevertheless, it does not provide notification when a resource is retransmitted to an unauthorized third party. To overcome this issue, one can use mechanisms such as Data Loss/Leak Prevention (DLP) or Transmission Control (TC). These mechanisms are based on policies that are defined by security experts. Unfortunately, these policies can contradict existing AC rules, leading to security leakage (i.e. a legitimate user is allowed to send a resource to someone who has no access rights in the AC).
Year
Venue
Field
2015
SecureComm
Transmission (mechanics),Data loss,Information security standards,Transmission security,Computer security,Computer science,Computer network,Third party,Access control,Security policy,Computer security model
DocType
Citations 
PageRank 
Conference
1
0.35
References 
Authors
8
4
Name
Order
Citations
PageRank
Yoann Bertrand110.35
Mireille Blay-Fornarino2173.50
Karima Boudaoud313013.08
michel riveill439854.88