Access Control with Uncertain Surveillance

We present a variant of the access control matrix model obtained by incorporating uncertain surveillance saying that "if subject s performs illegally action a on object o then the degree of likelihood that it will remain unpunished is equal to x". We then turn to the question whether the e...

Full description

Saved in:
Bibliographic Details
Published inIEEE/WIC/ACM International Conference on web intelligence pp. 778 - 781
Main Author Balbiani, Philippe
Format Conference Proceeding
LanguageEnglish
Published Washington, DC, USA IEEE Computer Society 19.09.2005
IEEE
SeriesACM Conferences
Subjects
Online AccessGet full text
ISBN076952415X
9780769524153
DOI10.1109/WI.2005.19

Cover

Abstract We present a variant of the access control matrix model obtained by incorporating uncertain surveillance saying that "if subject s performs illegally action a on object o then the degree of likelihood that it will remain unpunished is equal to x". We then turn to the question whether the expressive power of the matrix model grows when enriching access control with uncertain surveillance. In connection with this enriched model, we also discuss the solvable and unsolvable cases of the major theme of computer security, namely the safety problem for access control matrices.
AbstractList We present a variant of the access control matrix model obtained by incorporating uncertain surveillance saying that "if subject s performs illegally action a on object o then the degree of likelihood that it will remain unpunished is equal to x". We then turn to the question whether the expressive power of the matrix model grows when enriching access control with uncertain surveillance. In connection with this enriched model, we also discuss the solvable and unsolvable cases of the major theme of computer security, namely the safety problem for access control matrices.
We present a variant of the access control matrix model obtained by incorporating uncertain surveillance saying that "if subject s performs illegally action a on object o then the degree of likelihood that remains unpunished is equal to x". We then turn to the question whether the expressive power of the matrix model grows when enriching access control with uncertain surveillance. In connection with this enriched model, we also discuss the solvable and unsolvable cases of the major theme of computer security, namely the safety problem for access control matrices.
Author Balbiani, Philippe
Author_xml – sequence: 1
  givenname: Philippe
  surname: Balbiani
  fullname: Balbiani, Philippe
  organization: Institut de recherche en informatique de Toulouse
BackLink https://hal.science/hal-04002034$$DView record in HAL
BookMark eNp9kM1LAzEQxQMqqLUXr14WBEGhNR-bZHMsRW2h4EFLvYVsnKXR7aYm24r_vVlW9OZcZnjvx_B4p-iw8Q0gdE7wmBCsblfzMcWYj4k6QKdYCsVpTvjLMRrG-IbTMCVkgU_QzcRaiDGb-qYNvs4-XbvOlo2F0BrXZE-7sAdX1yYpZ-ioMnWE4c8eoOX93fN0Nlo8Psynk8XIMEzbkZG5KOVrUVTCkkoaYkorKkwgSYyWqkoXZ4W0BJJrKS2BC5oLngNQRQUboOv-79rUehvcxoQv7Y3Ts8lCdxrOMaaY5XuS2Kue3Qb_sYPY6o2LFrrA4HdRM4KFTE0k8KIHHQD8fiWcSMVZci9719iNLr1_j5pg3TWpV3PdNamJ-gv2H6XL4KBi3zNxcmQ
ContentType Conference Proceeding
Copyright Distributed under a Creative Commons Attribution 4.0 International License
Copyright_xml – notice: Distributed under a Creative Commons Attribution 4.0 International License
DBID 6IE
6IL
CBEJK
RIE
RIL
7SC
8FD
JQ2
L7M
L~C
L~D
1XC
DOI 10.1109/WI.2005.19
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Hyper Article en Ligne (HAL)
DatabaseTitle Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList

Computer and Information Systems Abstracts

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Religion
Computer Science
EndPage 781
ExternalDocumentID oai_HAL_hal_04002034v1
1517953
Genre orig-research
Conference Paper
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AARBI
ACM
ADPZR
ALMA_UNASSIGNED_HOLDINGS
APO
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
GUFHI
IERZE
OCL
RIB
RIC
RIE
RIL
AAWTH
LHSKQ
7SC
8FD
JQ2
L7M
L~C
L~D
1XC
ID FETCH-LOGICAL-a302t-a746b7d88f6c1f7a1abc6f01ed8832b9f1ed5387c1ef7ac22be5624654ee29263
IEDL.DBID RIE
ISBN 076952415X
9780769524153
IngestDate Fri May 09 12:22:31 EDT 2025
Fri Jul 11 08:59:00 EDT 2025
Tue Aug 26 19:41:52 EDT 2025
Wed Jan 31 06:36:50 EST 2024
IsPeerReviewed false
IsScholarly false
Keywords Access control
Surveillance
Permission
Control systems
Safety
Protection
Computer security
Power system modeling
Language English
License Distributed under a Creative Commons Attribution 4.0 International License: http://creativecommons.org/licenses/by/4.0
LinkModel DirectLink
MeetingName International Conference on Web Intelligence (WI 2005)
MergedId FETCHMERGED-LOGICAL-a302t-a746b7d88f6c1f7a1abc6f01ed8832b9f1ed5387c1ef7ac22be5624654ee29263
Notes SourceType-Conference Papers & Proceedings-1
ObjectType-Conference Paper-1
content type line 25
ORCID 0000-0002-3569-9160
PQID 31067200
PQPubID 23500
PageCount 4
ParticipantIDs acm_books_10_1109_WI_2005_19
proquest_miscellaneous_31067200
hal_primary_oai_HAL_hal_04002034v1
acm_books_10_1109_WI_2005_19_brief
ieee_primary_1517953
PublicationCentury 2000
PublicationDate 20050919
20050000
2005-09
PublicationDateYYYYMMDD 2005-09-19
2005-01-01
2005-09-01
PublicationDate_xml – month: 09
  year: 2005
  text: 20050919
  day: 19
PublicationDecade 2000
PublicationPlace Washington, DC, USA
PublicationPlace_xml – name: Washington, DC, USA
PublicationSeriesTitle ACM Conferences
PublicationTitle IEEE/WIC/ACM International Conference on web intelligence
PublicationTitleAbbrev WI
PublicationYear 2005
Publisher IEEE Computer Society
IEEE
Publisher_xml – name: IEEE Computer Society
– name: IEEE
SSID ssj0000396780
Score 1.3534117
Snippet We present a variant of the access control matrix model obtained by incorporating uncertain surveillance saying that "if subject s performs illegally action a...
We present a variant of the access control matrix model obtained by incorporating uncertain surveillance saying that 'if subject s performs illegally action a...
SourceID hal
proquest
ieee
acm
SourceType Open Access Repository
Aggregation Database
Publisher
StartPage 778
SubjectTerms Access control
Computer Science
Computer security
Control systems
History
Logic in Computer Science
Permission
Power system modeling
Protection
Safety
Security and privacy
Security and privacy -- Security services -- Access control
Security and privacy -- Systems security -- Operating systems security
Social and professional topics -- Computing -- technology policy -- Computer crime
Surveillance
Title Access Control with Uncertain Surveillance
URI https://ieeexplore.ieee.org/document/1517953
https://www.proquest.com/docview/31067200
https://hal.science/hal-04002034
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1RT9swED61PCCe2IBpZQwixNNEShw7afxYoVUtomgPQ-XNstOzhqa1qG36wK_nzmk6iaGJl8ixHSfx2Xe-8_k7gIvUkgxBTOMcUcVKYRbbTIu4cMJJgVMUIUzn-C4f3qubh-yhBZfbszCIGJzPsMvJsJc_nZcVm8quBONJZbINbRpm9VmtrT0lkZr4blJr5jpjwdQA7DT3cgNPKhJ9NRnV9hRG2Gnb8g9df7EnZAix8g9fDsJmsA_j5jNrH5Pf3WrluuXzKwTH9_7HBzj6e6wv-rEVWB-hhbMD2G2ckg_hWz9ET4w27usR22gjknu110C0rBZr5CBFlHME94PvP6-H8SaWQmxlkq5i21O5602Lwuel8D0rrCtznxA1CprTTntKEe_rlQKptExTh7QyYrA1IqROc_kJdmbzGX6GSPNWpfSkKmGpvFaaKvhC-Rydz23mO3BCHWpYSViaoGMk2kxGHPAyM0J34Px_xcYtHpHaOCdymKcaccMwBvawf2s4j7lOmki1Fh045L7d1tp0awfOGuoZmiu8AWJnOK-WRjJeHr3n-O0Hv8BeAGYNBpYT2FktKvxKS46VOw1j7QUJZs3C
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3dT9swED8Bk4CnMT60QhkR2tNEShw7afxYTUPt1iIeQPBm2elZILQWtQ0P_PXcOU2R2DTtJXJs58sX3_nOd78D-JpakiGIaZwjqlgpzGKbaREXTjgpcIwipOkcXeb9G_XzLrtbg7NVLAwiBucz7HAx7OWPp2XFprJzwXhSmVyHDyT3VVZHa60sKonUxHmTWjfXGYumBmKnOZdLgFKR6PPbQW1RYYyddVv-puM9-0KGJCt_cOYgbi4-wqh50drL5LFTLVynfHmH4fi_X7ID-2-BfdHVSmR9gjWc7MJm45a8B996IX9itHRgj9hKG5Hkq_0Gonk1e0ZOU0Q1-3Bz8eP6ez9eZlOIrUzSRWy7KnfdcVH4vBS-a4V1Ze4TokdBs9ppTyXift1SILWWaeqQ1kYMt0ak1GkuD2BjMp3gZ4g0b1ZKT8oSlsprpamDL5TP0fncZr4FbRpQw2rC3AQtI9HmdsApLzMjdAtO_9Vs3OwB6R6nRA7zVGNuGEbB7veGhuuY76SJVM-iBXs8tqtey2FtwUlDPUOzhbdA7ASn1dxIRsyj5xz-_cIT2Opfj4ZmOLj8dQTbAaY1mFvasLGYVXhMC5CF-xL-u1cAuNEP
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=IEEE%2FWIC%2FACM+International+Conference+on+web+intelligence&rft.atitle=Access+control+with+uncertain+surveillance&rft.au=Balbiani%2C+P.&rft.date=2005-01-01&rft.pub=IEEE&rft.isbn=9780769524153&rft.spage=778&rft.epage=781&rft_id=info:doi/10.1109%2FWI.2005.19&rft.externalDocID=1517953
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769524153/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769524153/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769524153/sc.gif&client=summon&freeimage=true