This HTML5 document contains 30 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dctermshttp://purl.org/dc/terms/
n21https://kar.kent.ac.uk/id/eprint/81860#
n2https://kar.kent.ac.uk/id/eprint/
wdrshttp://www.w3.org/2007/05/powder-s#
dchttp://purl.org/dc/elements/1.1/
n12http://purl.org/ontology/bibo/status/
rdfshttp://www.w3.org/2000/01/rdf-schema#
n4https://kar.kent.ac.uk/id/subject/
n8https://demo.openlinksw.com/about/id/entity/https/raw.githubusercontent.com/annajordanous/CO644Files/main/
n14https://kar.kent.ac.uk/81860/
n10http://eprints.org/ontology/
bibohttp://purl.org/ontology/bibo/
n19https://kar.kent.ac.uk/id/publication/
n18https://kar.kent.ac.uk/id/org/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n16doi:10.1016/
owlhttp://www.w3.org/2002/07/owl#
n11https://kar.kent.ac.uk/id/document/
n17https://kar.kent.ac.uk/id/
xsdhhttp://www.w3.org/2001/XMLSchema#
n9https://demo.openlinksw.com/about/id/entity/https/www.cs.kent.ac.uk/people/staff/akj22/materials/CO644/
n6https://kar.kent.ac.uk/id/person/

Statements

Subject Item
n2:81860
rdf:type
bibo:Article n10:ArticleEPrint bibo:AcademicArticle n10:EPrint
rdfs:seeAlso
n14:
owl:sameAs
n16:j.future.2020.06.045
n10:hasAccepted
n11:3211359
n10:hasDocument
n11:3211484 n11:3211359 n11:3211360 n11:3211481 n11:3211482 n11:3211483
dc:hasVersion
n11:3211359
dcterms:title
Malicious Changeload for the Resilience Evaluation of Self-adaptive Authorisation Infrastructures
wdrs:describedby
n8:export_kar_RDFN3.n3 n9:export_kar_RDFN3.n3
dcterms:date
2020-07-01
dcterms:creator
n6:ext-r.delemos@kent.ac.uk n6:ext-f1388d93f2dbf08ada95d074fc342cf6
bibo:status
n12:peerReviewed n12:published
dcterms:publisher
n18:ext-f308aad1ef8f70546c3a197f104f2ad5
bibo:abstract
Self-adaptive systems are able to modify their behaviour and/or structure in response to changes that occur to the system, its environment, or even its goals. In terms of authorisation infrastructures, self-adaptation has shown to be a promising solution for enforcing access control policies and subject access privileges when mitigating insider threat. This paper describes the resilience evaluation of a self-adaptive authorisation infrastructure by simulating a case study related to insider threats. As part of this evaluation, a malicious changeload has been formally defined in order to describe scenarios of abuse in access control. This malicious changeload was then used to stimulate self-adaptation within a federated authorisation infrastructure. The evaluation confirmed the resilience of a self-adaptive authorisation infrastructure in handling abuse of access under repeatable conditions by consistently mitigating abuse under normal and high loads. The evaluation has also shown that self-adaptation had a minimal impact on the authorisation infrastructure, even when adapting authorisation policies while mitigating abuse of access.
dcterms:isPartOf
n17:repository n19:ext-0167739X
dcterms:subject
n4:QA76 n4:QA76.76
bibo:authorList
n21:authors
bibo:volume
113