Risk Modulating Factors in Risk-Based Access Control for Information in a MANET

We present an approach for evaluating risk using risk–contributing factors. This approach could be applied recursively to a hierarchy of risk–contributing factors. We also use a MANET scenario to demonstrate how the approach may be applied. We believe that the scenario covers some of the most important risk factors regarding access control for information in a MANET. The set of risk factors discussed in this paper is by no means complete. Besides the usual technical considerations for information system security, other factors such as human psychology, social network and warfare should also be taken into consideration to evaluate risk in a MANET and much more research is needed.

By: Pau-Chen Cheng; Paul A. Karger

Published in: RC24494 in 2008

LIMITED DISTRIBUTION NOTICE:

This Research Report is available. This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. It has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM prior to publication should be limited to peer communications and specific requests. After outside publication, requests should be filled only by reprints or legally obtained copies of the article (e.g., payment of royalties). I have read and understand this notice and am a member of the scientific community outside or inside of IBM seeking a single copy only.

rc24494.pdf

Questions about this service can be mailed to reports@us.ibm.com .