Publication: Research - peer-review › Article in proceedings – Annual report year: 2012
Wiki systems form a subclass of the more general Open Collaborative Authoring Systems, where content is created and maintained by a user community. The ability of anyone to edit the content is, at the same time, their strength and their weakness. Anyone can write documents that improve the value of the wiki-system, but at the same time, anyone can also introduce errors into these documents, by accident or on purpose. A security model for wiki-style authoring systems has previously been proposed. This model is based on both static and dynamic document access controls that enforce a simple integrity based security policy. In this paper, we present a new policy for the existing wiki security model, which provides a higher degree of parameterization and adaptability. The new policy is analyzed and compared to the original policy. Our evaluation shows that this new policy provides stronger security when the number of malicious and colluding users is low, but it has a clearly defined level of tolerance in terms of the amount of work required by an attacker to achieve a given probability of violating the policy. Efforts beyond that level, can allow such users to take control of the system, but this is true for all soft security systems. We show that the system parameters can be tuned so that the amount of work required by malicious and colluding users to reach this level is well beyond most attackers' capabilities.
|Title of host publication||2012 Tenth Annual International Conference on Privacy, Security and Trust (PST)|
|State||Published - 2012|
|Event||10th Annual International Conference on Privacy, Security and Trust (PST 2012) - Paris, France|
|Conference||10th Annual International Conference on Privacy, Security and Trust (PST 2012)|
|Period||16/07/2012 → 18/07/2012|
|Citations||Error in DOI please contact firstname.lastname@example.org|
Loading map data...