Access Control with Uncertain Surveillance
We present a variant of the access control matrix model obtained by incorporating uncertain surveillance saying that "if subject s performs illegally action a on object o then the degree of likelihood that it will remain unpunished is equal to x". We then turn to the question whether the e...
Saved in:
Published in | IEEE/WIC/ACM International Conference on web intelligence pp. 778 - 781 |
---|---|
Main Author | |
Format | Conference Proceeding |
Language | English |
Published |
Washington, DC, USA
IEEE Computer Society
19.09.2005
IEEE |
Series | ACM Conferences |
Subjects | |
Online Access | Get full text |
ISBN | 076952415X 9780769524153 |
DOI | 10.1109/WI.2005.19 |
Cover
Abstract | We present a variant of the access control matrix model obtained by incorporating uncertain surveillance saying that "if subject s performs illegally action a on object o then the degree of likelihood that it will remain unpunished is equal to x". We then turn to the question whether the expressive power of the matrix model grows when enriching access control with uncertain surveillance. In connection with this enriched model, we also discuss the solvable and unsolvable cases of the major theme of computer security, namely the safety problem for access control matrices. |
---|---|
AbstractList | We present a variant of the access control matrix model obtained by incorporating uncertain surveillance saying that "if subject s performs illegally action a on object o then the degree of likelihood that it will remain unpunished is equal to x". We then turn to the question whether the expressive power of the matrix model grows when enriching access control with uncertain surveillance. In connection with this enriched model, we also discuss the solvable and unsolvable cases of the major theme of computer security, namely the safety problem for access control matrices. We present a variant of the access control matrix model obtained by incorporating uncertain surveillance saying that "if subject s performs illegally action a on object o then the degree of likelihood that remains unpunished is equal to x". We then turn to the question whether the expressive power of the matrix model grows when enriching access control with uncertain surveillance. In connection with this enriched model, we also discuss the solvable and unsolvable cases of the major theme of computer security, namely the safety problem for access control matrices. |
Author | Balbiani, Philippe |
Author_xml | – sequence: 1 givenname: Philippe surname: Balbiani fullname: Balbiani, Philippe organization: Institut de recherche en informatique de Toulouse |
BackLink | https://hal.science/hal-04002034$$DView record in HAL |
BookMark | eNp9kM1LAzEQxQMqqLUXr14WBEGhNR-bZHMsRW2h4EFLvYVsnKXR7aYm24r_vVlW9OZcZnjvx_B4p-iw8Q0gdE7wmBCsblfzMcWYj4k6QKdYCsVpTvjLMRrG-IbTMCVkgU_QzcRaiDGb-qYNvs4-XbvOlo2F0BrXZE-7sAdX1yYpZ-ioMnWE4c8eoOX93fN0Nlo8Psynk8XIMEzbkZG5KOVrUVTCkkoaYkorKkwgSYyWqkoXZ4W0BJJrKS2BC5oLngNQRQUboOv-79rUehvcxoQv7Y3Ts8lCdxrOMaaY5XuS2Kue3Qb_sYPY6o2LFrrA4HdRM4KFTE0k8KIHHQD8fiWcSMVZci9719iNLr1_j5pg3TWpV3PdNamJ-gv2H6XL4KBi3zNxcmQ |
ContentType | Conference Proceeding |
Copyright | Distributed under a Creative Commons Attribution 4.0 International License |
Copyright_xml | – notice: Distributed under a Creative Commons Attribution 4.0 International License |
DBID | 6IE 6IL CBEJK RIE RIL 7SC 8FD JQ2 L7M L~C L~D 1XC |
DOI | 10.1109/WI.2005.19 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Hyper Article en Ligne (HAL) |
DatabaseTitle | Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Computer and Information Systems Abstracts |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Religion Computer Science |
EndPage | 781 |
ExternalDocumentID | oai_HAL_hal_04002034v1 1517953 |
Genre | orig-research Conference Paper |
GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AARBI ACM ADPZR ALMA_UNASSIGNED_HOLDINGS APO BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK GUFHI IERZE OCL RIB RIC RIE RIL AAWTH LHSKQ 7SC 8FD JQ2 L7M L~C L~D 1XC |
ID | FETCH-LOGICAL-a302t-a746b7d88f6c1f7a1abc6f01ed8832b9f1ed5387c1ef7ac22be5624654ee29263 |
IEDL.DBID | RIE |
ISBN | 076952415X 9780769524153 |
IngestDate | Fri May 09 12:22:31 EDT 2025 Fri Jul 11 08:59:00 EDT 2025 Tue Aug 26 19:41:52 EDT 2025 Wed Jan 31 06:36:50 EST 2024 |
IsPeerReviewed | false |
IsScholarly | false |
Keywords | Access control Surveillance Permission Control systems Safety Protection Computer security Power system modeling |
Language | English |
License | Distributed under a Creative Commons Attribution 4.0 International License: http://creativecommons.org/licenses/by/4.0 |
LinkModel | DirectLink |
MeetingName | International Conference on Web Intelligence (WI 2005) |
MergedId | FETCHMERGED-LOGICAL-a302t-a746b7d88f6c1f7a1abc6f01ed8832b9f1ed5387c1ef7ac22be5624654ee29263 |
Notes | SourceType-Conference Papers & Proceedings-1 ObjectType-Conference Paper-1 content type line 25 |
ORCID | 0000-0002-3569-9160 |
PQID | 31067200 |
PQPubID | 23500 |
PageCount | 4 |
ParticipantIDs | acm_books_10_1109_WI_2005_19 proquest_miscellaneous_31067200 hal_primary_oai_HAL_hal_04002034v1 acm_books_10_1109_WI_2005_19_brief ieee_primary_1517953 |
PublicationCentury | 2000 |
PublicationDate | 20050919 20050000 2005-09 |
PublicationDateYYYYMMDD | 2005-09-19 2005-01-01 2005-09-01 |
PublicationDate_xml | – month: 09 year: 2005 text: 20050919 day: 19 |
PublicationDecade | 2000 |
PublicationPlace | Washington, DC, USA |
PublicationPlace_xml | – name: Washington, DC, USA |
PublicationSeriesTitle | ACM Conferences |
PublicationTitle | IEEE/WIC/ACM International Conference on web intelligence |
PublicationTitleAbbrev | WI |
PublicationYear | 2005 |
Publisher | IEEE Computer Society IEEE |
Publisher_xml | – name: IEEE Computer Society – name: IEEE |
SSID | ssj0000396780 |
Score | 1.3534117 |
Snippet | We present a variant of the access control matrix model obtained by incorporating uncertain surveillance saying that "if subject s performs illegally action a... We present a variant of the access control matrix model obtained by incorporating uncertain surveillance saying that 'if subject s performs illegally action a... |
SourceID | hal proquest ieee acm |
SourceType | Open Access Repository Aggregation Database Publisher |
StartPage | 778 |
SubjectTerms | Access control Computer Science Computer security Control systems History Logic in Computer Science Permission Power system modeling Protection Safety Security and privacy Security and privacy -- Security services -- Access control Security and privacy -- Systems security -- Operating systems security Social and professional topics -- Computing -- technology policy -- Computer crime Surveillance |
Title | Access Control with Uncertain Surveillance |
URI | https://ieeexplore.ieee.org/document/1517953 https://www.proquest.com/docview/31067200 https://hal.science/hal-04002034 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1RT9swED61PCCe2IBpZQwixNNEShw7afxYoVUtomgPQ-XNstOzhqa1qG36wK_nzmk6iaGJl8ixHSfx2Xe-8_k7gIvUkgxBTOMcUcVKYRbbTIu4cMJJgVMUIUzn-C4f3qubh-yhBZfbszCIGJzPsMvJsJc_nZcVm8quBONJZbINbRpm9VmtrT0lkZr4blJr5jpjwdQA7DT3cgNPKhJ9NRnV9hRG2Gnb8g9df7EnZAix8g9fDsJmsA_j5jNrH5Pf3WrluuXzKwTH9_7HBzj6e6wv-rEVWB-hhbMD2G2ckg_hWz9ET4w27usR22gjknu110C0rBZr5CBFlHME94PvP6-H8SaWQmxlkq5i21O5602Lwuel8D0rrCtznxA1CprTTntKEe_rlQKptExTh7QyYrA1IqROc_kJdmbzGX6GSPNWpfSkKmGpvFaaKvhC-Rydz23mO3BCHWpYSViaoGMk2kxGHPAyM0J34Px_xcYtHpHaOCdymKcaccMwBvawf2s4j7lOmki1Fh045L7d1tp0awfOGuoZmiu8AWJnOK-WRjJeHr3n-O0Hv8BeAGYNBpYT2FktKvxKS46VOw1j7QUJZs3C |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3dT9swED8Bk4CnMT60QhkR2tNEShw7afxYTUPt1iIeQPBm2elZILQWtQ0P_PXcOU2R2DTtJXJs58sX3_nOd78D-JpakiGIaZwjqlgpzGKbaREXTjgpcIwipOkcXeb9G_XzLrtbg7NVLAwiBucz7HAx7OWPp2XFprJzwXhSmVyHDyT3VVZHa60sKonUxHmTWjfXGYumBmKnOZdLgFKR6PPbQW1RYYyddVv-puM9-0KGJCt_cOYgbi4-wqh50drL5LFTLVynfHmH4fi_X7ID-2-BfdHVSmR9gjWc7MJm45a8B996IX9itHRgj9hKG5Hkq_0Gonk1e0ZOU0Q1-3Bz8eP6ez9eZlOIrUzSRWy7KnfdcVH4vBS-a4V1Ze4TokdBs9ppTyXift1SILWWaeqQ1kYMt0ak1GkuD2BjMp3gZ4g0b1ZKT8oSlsprpamDL5TP0fncZr4FbRpQw2rC3AQtI9HmdsApLzMjdAtO_9Vs3OwB6R6nRA7zVGNuGEbB7veGhuuY76SJVM-iBXs8tqtey2FtwUlDPUOzhbdA7ASn1dxIRsyj5xz-_cIT2Opfj4ZmOLj8dQTbAaY1mFvasLGYVXhMC5CF-xL-u1cAuNEP |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=IEEE%2FWIC%2FACM+International+Conference+on+web+intelligence&rft.atitle=Access+control+with+uncertain+surveillance&rft.au=Balbiani%2C+P.&rft.date=2005-01-01&rft.pub=IEEE&rft.isbn=9780769524153&rft.spage=778&rft.epage=781&rft_id=info:doi/10.1109%2FWI.2005.19&rft.externalDocID=1517953 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769524153/lc.gif&client=summon&freeimage=true |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769524153/mc.gif&client=summon&freeimage=true |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769524153/sc.gif&client=summon&freeimage=true |