Propagation and Delegation of Rights in Access Controls and Risk Assessment Techniques

Propagation and Delegation of Rights in Access Controls and Risk Assessment Techniques

Saravanan Muthaiyah
Copyright: © 2007 |Pages: 10
DOI: 10.4018/978-1-59904-168-1.ch018
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Access control methods have been improvised over time, but one area that remains quite grey is the concept of assessing risk levels before any type of access rights are granted. This is relatively a new paradigm in the research of semantic Web security, and new methodologies for this effort are being studied. In this chapter, we will see how qualitative risk assessment (Nissanke & Khayat, 2004) and quantitative risk assessment are carried out. The purpose is to have different methods of assessment for better grant of access control rights and permissions. New examples based on the model described (Nissanke & Khayat, 2004) are used to illustrate the concept. A new quantities technique is also added to complement the qualitative techniques.

Complete Chapter List

Search this Book:
Reset