Crampton and Huth, 2010

Towards an Access-Control Framework for Countering Insider Threats

book-section

Authors

  • Crampton, J.

  • Huth, M.

Publication

Probst et al., 2010, p. 173-195

Year

2010

 

Abstract

As insider threats pose very significant security risks to IT systems, we ask what policy-based approaches to access control can do for the detection, mitigation or countering of insider threats and insider attacks. Answering this question is difficult: little public data about insider-threat cases is available; there is not much consensus about what the insider problem actually is; and previous research in access control has by-and-large not dealt with this issue. We explore existing notions of insiderness in order to identify the relevant research issues. We then formulate a set of requirements for next-generation access-control systems, whose realization might form part of an overall strategy to address the insider problem.

Links

Citation

Crampton, J., Huth, M., 2010. Towards an Access-Control Framework for Countering Insider Threats, in: Probst, C.W., Hunker, J., Gollmann, D., Bishop, M. (Eds.), Insider Threats in Cyber Security, Advances in Information Security. Springer US, Boston, MA, pp. 173–195. https://doi.org/10.1007/978-1-4419-7133-3_8


Follow us on LinkedIn | Discuss on Slack | Support us with Patreon | Sign-up for a free membership.


This wiki is owned by Open Measure, a non-profit association. The original content we publish is licensed under a Creative Commons Attribution 4.0 International License.