Skip to main content

Showing 1–7 of 7 results for author: Fong, P W L

.
  1. arXiv:2401.00086  [pdf, other

    cs.CR cs.LG

    Quantifying Policy Administration Cost in an Active Learning Framework

    Authors: Si Zhang, Philip W. L. Fong

    Abstract: This paper proposes a computational model for policy administration. As an organization evolves, new users and resources are gradually placed under the mediation of the access control model. Each time such new entities are added, the policy administrator must deliberate on how the access control policy shall be revised to reflect the new reality. A well-designed access control model must anticipat… ▽ More

    Submitted 29 December, 2023; originally announced January 2024.

  2. arXiv:2312.15596  [pdf, other

    cs.CR

    Mining Domain-Based Policies

    Authors: Si Zhang, Philip W. L. Fong

    Abstract: Protection domains are one of the most enduring concepts in Access Control. Entities with identical access control characteristics are grouped under the same protection domain, and domain-based policies assign access privileges to the protection domain as a whole. With the advent of the Internet of Things (IoT), devices play the roles of both subjects and objects. Domain-based policies are particu… ▽ More

    Submitted 24 December, 2023; originally announced December 2023.

  3. A Capability-based Distributed Authorization System to Enforce Context-aware Permission Sequences

    Authors: Adrian Shuai Li, Reihaneh Safavi-Naini, Philip W. L. Fong

    Abstract: Controlled sharing is fundamental to distributed systems. We consider a capability-based distributed authorization system where a client receives capabilities (access tokens) from an authorization server to access the resources of resource servers. Capability-based authorization systems have been widely used on the Web, in mobile applications and other distributed systems. A common requirement o… ▽ More

    Submitted 9 November, 2022; originally announced November 2022.

  4. arXiv:1809.10134  [pdf, other

    cs.CR

    Brokering Policies and Execution Monitors for IoT Middleware

    Authors: Juan Carlos Fuentes Carranza, Philip W. L. Fong

    Abstract: Event-based systems lie at the heart of many cloud-based Internet-of-Things (IoT) platforms. This combination of the Broker architectural style and the Publisher-Subscriber design pattern provides a way for smart devices to communicate and coordinate with one another. The present design of these cloud-based IoT frameworks lacks measures to (i) protect devices against malicious cloud disconnections… ▽ More

    Submitted 27 September, 2018; v1 submitted 26 September, 2018; originally announced September 2018.

  5. arXiv:1809.10106  [pdf, ps, other

    cs.CR

    Results in Workflow Resiliency: Complexity, New Formulation, and ASP Encoding

    Authors: Philip W. L. Fong

    Abstract: First proposed by Wang and Li in 2007, workflow resiliency is a policy analysis for ensuring that, even when an adversarial environment removes a subset of workers from service, a workflow can still be instantiated to satisfy all the security constraints. Wang and Li proposed three notions of workflow resiliency: static, decremental, and dynamic resiliency. While decremental and dynamic resiliency… ▽ More

    Submitted 26 September, 2018; originally announced September 2018.

  6. arXiv:1804.00086  [pdf, other

    cs.CR

    HCAP: A History-Based Capability System for IoT Devices

    Authors: Lakshya Tandon, Philip W. L. Fong, Reihaneh Safavi-Naini

    Abstract: Permissions are highly sensitive in Internet-of-Things (IoT) applications, as IoT devices collect our personal data and control the safety of our environment. Rather than simply granting permissions, further constraints shall be imposed on permission usage so as to realize the Principle of Least Privilege. Since IoT devices are physically embedded, they are often accessed in a particular sequence… ▽ More

    Submitted 30 March, 2018; originally announced April 2018.

  7. arXiv:1503.06154  [pdf, other

    cs.CR

    Relationship-Based Access Control for OpenMRS

    Authors: Syed Zain Rizvi, Philip W. L. Fong, Jason Crampton, James Sellwood

    Abstract: Inspired by the access control models of social network systems, Relationship-Based Access Control (ReBAC) was recently proposed as a general-purpose access control paradigm for application domains in which authorization must take into account the relationship between the access requestor and the resource owner. The healthcare domain is envisioned to be an archetypical application domain in which… ▽ More

    Submitted 20 March, 2015; originally announced March 2015.