23
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Implementing Access Control Markov Decision Processes with GLPK/GMPL

      Preprint

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          In a recent approach, we proposed to model an access control mechanism as a Markov Decision Process, thus claiming that in order to make an access control decision, one can use well-defined mechanisms from decision theory. We present in this paper an implementation of such mechanism, using the open-source solver GLPK, and we model the problem in the GMPL language. We illustrate our approach with a simple, yet expressive example, and we show how the variation of some parameters can change the final outcome. In particular, we show that in addition to returning a decision, we can also calculate the value of each decision.

          Related collections

          Most cited references4

          • Record: found
          • Abstract: not found
          • Article: not found

          A Markovian Decision Process

            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            Enforcing Access Control Using Risk Assessment

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Risk-based access control systems built on fuzzy inferences

                Bookmark

                Author and article information

                Journal
                23 August 2012
                2012-08-24
                Article
                1208.4722
                a4657c89-0e99-44be-9393-e91f2e12f463

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                History
                Custom metadata
                15 pages, 6 figures, to be presented at the first International Workshop on Quantitative Aspects in Security Assurance, in colocation with ESORICS 2012
                cs.CR

                Comments

                Comment on this article