Computing Publications

Publications Home » Detecting and Countering Insider ...

Detecting and Countering Insider Threats: Can Policy-Based Access Control Help?

Jason Crampton, Michael Huth

Conference or Workshop Paper
5th International Workshop on Security and Trust Management (STM 2009)
2009
Electronic Notes in Theoretical Computer Science
Elsevier
Abstract

As insider threats pose very significant security risks to IT systems, we ask what policy-based approaches to access control can do for the detection, mitigation or countering of insider threats and insider attacks. Answering this question is difficult since little public data about insider-threat cases is available, since there is not much consensus about what the insider problem actually is, and since research in access control has by-and-large not dealt with this issue in the past. We explore existing notions of insiderness in order to identify the relevant research issues. We then formulate a set of requirements for next-generation access-control systems whose realization might form part of an overall strategy at addressing the insider problem.

BibTEX file for the publication
 

pubs.doc.ic.ac.uk: built & maintained by Ashok Argent-Katwala.