首页> 外文期刊>Computers & Security >Adapting usage control as a deterrent to address the inadequacies of access controls
【24h】

Adapting usage control as a deterrent to address the inadequacies of access controls

机译:调整使用控制作为威慑,以解决访问控制的不足

获取原文
获取原文并翻译 | 示例

摘要

Access controls are difficult to implement and evidently deficient under certain conditions. Traditional controls offer no protection for unclassified information, such as a telephone list of employees that is unrestricted, yet available only to members of the company. On the opposing side of the continuum, organizations such as hospitals that manage highly sensitive information require stricter access control measures. Yet, traditional access control may well have inadvertent consequences in such a context. Often, in unpredictable circumstances, users that are denied access could have prevented a calamity had they been allowed access. It has been proposed that controls such as auditing and accountability policies be enforced to deter rather than prevent unauthorized usage. In dynamic environments preconfigured access control policies may change dramatically depending on the context. Moreover, the cost of implementing and maintaining complex preconfigured access control policies sometimes far outweighs the benefits. This paper considers an adaptation of usage control as a proactive means of deterrence control to protect information that cannot be adequately or reasonably protected by access control.
机译:访问控制在某些情况下难以实施且明显不足。传统的控件无法保护未分类的信息,例如不受限制的员工电话列表,但仅对公司成员可用。另一方面,管理高度敏感信息的组织(如医院)需要更严格的访问控制措施。然而,在这种情况下,传统的访问控制很可能会造成无意的后果。通常,在无法预测的情况下,如果拒绝了访问,则允许用户访问这些用户可以避免灾难。已经提出强制执行诸如审计和责任制之类的控制来阻止而不是防止未经授权的使用。在动态环境中,预配置的访问控制策略可能会根据上下文发生巨大变化。此外,实施和维护复杂的预配置访问控制策略的成本有时远远超过其收益。本文认为使用控制的适应是一种威慑控制的积极手段,可以保护无法由访问控制充分或合理保护的信息。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号