Next Article in Journal
Improvements of the xAAL Home Automation System
Previous Article in Journal
CMS: A Continuous Machine-Learning and Serving Platform for Industrial Big Data
Open AccessReview

Risk-Based Access Control Model: A Systematic Literature Review

1
Electronic and Computer Science Department, University of Southampton, Southampton SO17 1BJ, UK
2
Computer Science and Engineering Department, Faculty of Electronic Engineering, Menoufia University, Menouf 32952, Egypt
3
Department of Engineering and Technology, University of Derby, Derby DE22 1GB, UK
4
Department of Information Technology, Faculty of Computing and IT, King Abdulaziz University, Jeddah 21589, Saudi Arabia
5
Department of Information Systems and Technology, College of Computer Science and Engineering, University of Jeddah, Jeddah 23218, Saudi Arabia
6
Computer Science Department, Faculty of Computing and Information Technology, Northern Border University, Arar 9280, Saudi Arabia
*
Author to whom correspondence should be addressed.
Future Internet 2020, 12(6), 103; https://doi.org/10.3390/fi12060103
Received: 1 May 2020 / Revised: 1 June 2020 / Accepted: 3 June 2020 / Published: 11 June 2020
(This article belongs to the Special Issue Emerging Trends of Fog Computing in Internet of Things Applications)
Most current access control models are rigid, as they are designed using static policies that always give the same outcome in different circumstances. In addition, they cannot adapt to environmental changes and unpredicted situations. With dynamic systems such as the Internet of Things (IoT) with billions of things that are distributed everywhere, these access control models are obsolete. Hence, dynamic access control models are required. These models utilize not only access policies but also contextual and real-time information to determine the access decision. One of these dynamic models is the risk-based access control model. This model estimates the security risk value related to the access request dynamically to determine the access decision. Recently, the risk-based access control model has attracted the attention of several organizations and researchers to provide more flexibility in accessing system resources. Therefore, this paper provides a systematic review and examination of the state-of-the-art of the risk-based access control model to provide a detailed understanding of the topic. Based on the selected search strategy, 44 articles (of 1044 articles) were chosen for a closer examination. Out of these articles, the contributions of the selected articles were summarized. In addition, the risk factors used to build the risk-based access control model were extracted and analyzed. Besides, the risk estimation techniques used to evaluate the risks of access control operations were identified. View Full-Text
Keywords: access control; security risk; risk-based access control; risk estimation techniques; risk factors; systematic review access control; security risk; risk-based access control; risk estimation techniques; risk factors; systematic review
Show Figures

Figure 1

MDPI and ACS Style

Atlam, H.F.; Azad, M.A.; Alassafi, M.O.; Alshdadi, A.A.; Alenezi, A. Risk-Based Access Control Model: A Systematic Literature Review. Future Internet 2020, 12, 103.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Search more from Scilit
 
Search
Back to TopTop