Identifying high-risk over-entitlement in access control policies using fuzzy logic.
Simon ParkinsonSaad KhanPublished in: Cybersecur. (2022)
Keyphrases
- high risk
- access control policies
- access control
- conflict resolution
- risk factors
- access control systems
- security policies
- prostate cancer
- distributed environment
- fine grained
- trust negotiation
- security mechanisms
- automated trust negotiation
- security issues
- computer aided
- software engineering
- data sources
- metadata
- artificial intelligence