Security Fault Tolerance for Access Control

Dongsoo Jang, Michael Shin, Don Pathirage

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This paper describes an approach to the security fault tolerance of access control in which the security breaches of an access control are tolerated by means of a security fault tolerant (SFT) access control. Though an access control is securely designed and implemented, it can contain faults in development or be contaminated in operation. The threats to an access control are analyzed to identify possible security breaches. To tolerate the security breaches, an SFT access control is made to be semantically identical to an access control. Our approach is described using role-based access control (RBAC) and extended access control list (EACL). A healthcare system is used to demonstrate our approach.

Original languageEnglish
Title of host publicationProceedings - 2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion, ACSOS-C 2020
EditorsEsam El-Araby, Sven Tomforde, Timothy Wood, Pradeep Kumar, Claudia Raibulet, Ioan Petri, Gabriele Valentini, Phyllis Nelson, Barry Porter
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages212-217
Number of pages6
ISBN (Electronic)9781728184142
DOIs
StatePublished - Aug 2020
Event1st IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion, ACSOS-C 2020 - Virtual, Washington, United States
Duration: Aug 17 2020Aug 21 2020

Publication series

NameProceedings - 2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion, ACSOS-C 2020

Conference

Conference1st IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion, ACSOS-C 2020
CountryUnited States
CityVirtual, Washington
Period08/17/2008/21/20

Keywords

  • EACL
  • RBAC
  • access control
  • security fault tolerance

Fingerprint Dive into the research topics of 'Security Fault Tolerance for Access Control'. Together they form a unique fingerprint.

Cite this