25
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Implementing Access Control Markov Decision Processes with GLPK/GMPL

      Preprint

      Read this article at

          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          In a recent approach, we proposed to model an access control mechanism as a Markov Decision Process, thus claiming that in order to make an access control decision, one can use well-defined mechanisms from decision theory. We present in this paper an implementation of such mechanism, using the open-source solver GLPK, and we model the problem in the GMPL language. We illustrate our approach with a simple, yet expressive example, and we show how the variation of some parameters can change the final outcome. In particular, we show that in addition to returning a decision, we can also calculate the value of each decision.

          Related collections

          Most cited references4

          • Record: found
          • Abstract: not found
          • Article: not found

          A Markovian Decision Process

            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            Enforcing Access Control Using Risk Assessment

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Risk-based access control systems built on fuzzy inferences

                Bookmark

                Author and article information

                Journal
                23 August 2012
                2012-08-24
                Article
                1208.4722
                a4657c89-0e99-44be-9393-e91f2e12f463

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                History
                Custom metadata
                15 pages, 6 figures, to be presented at the first International Workshop on Quantitative Aspects in Security Assurance, in colocation with ESORICS 2012
                cs.CR

                Comments

                Comment on this article