A calculus for the qualitative risk assessment of policy override authorization, Proceedings of the 3rd international conference on Security of information and networks, SIN '10, pp.62-70, 2010. ,
DOI : 10.1145/1854099.1854115
Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.222-230, 2007. ,
DOI : 10.1109/SP.2007.21
Enforcing Access Control Using Risk Assessment, Fourth European Conference on Universal Multiservice Networks (ECUMN'07), pp.419-424, 2007. ,
DOI : 10.1109/ECUMN.2007.19
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.510.6592
An attribute based framework for riskadaptive access control models, Proceedings the 6th International Conference on Availability, Reliability and Security (ARES'11), 2011. ,
DOI : 10.1109/ares.2011.41
Risk adaptive access control (RAdAC), Proceedings of NIST & NSA Privilege Management Workshop, 2009. ,
Risk-based access control systems built on fuzzy inferences, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, pp.250-260, 2010. ,
DOI : 10.1145/1755688.1755719
Quantified risk-adaptive access control for patient privacy protection in health information systems, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11, pp.406-410, 2011. ,
DOI : 10.1145/1966913.1966969