IPBAC: Interaction Provenance-Based Access Control for Secure and Privacy-Aware Systems
- URL: http://arxiv.org/abs/2602.07722v1
- Date: Sat, 07 Feb 2026 22:32:59 GMT
- Title: IPBAC: Interaction Provenance-Based Access Control for Secure and Privacy-Aware Systems
- Authors: Sharif Noor Zisad, Ragib Hasan,
- Abstract summary: We introduce the Interaction Provenance-based Access Control (IPBAC) model.<n>IPBAC ensures stronger protection against unauthorized access, enhances traceability for auditing and compliance, and supports adaptive security policies.<n>This provenance-based access control not only strengthens security, but also provides a robust framework for auditing and compliance.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Traditional access control systems, including RBAC, face significant limitations such as inflexible role definitions, difficulty handling dynamic scenarios, and lack of detailed accountability and traceability. To this end, we introduce the Interaction Provenance-based Access Control (IPBAC) model. In this paper, we explore the integration of interaction provenance with access control to overcome these limitations. Interaction provenance refers to the detailed recording of actions and interactions within a system, capturing comprehensive metadata such as the identity of the actor, the time of an action, and the context. IPBAC ensures stronger protection against unauthorized access, enhances traceability for auditing and compliance, and supports adaptive security policies. This provenance-based access control not only strengthens security, but also provides a robust framework for auditing and compliance.
Related papers
- BarrierSteer: LLM Safety via Learning Barrier Steering [83.12893815611052]
BarrierSteer is a novel framework that formalizes safety by embedding learned non-linear safety constraints directly into the model's latent representation space.<n>We show that BarrierSteer substantially reduces adversarial success rates, decreases unsafe generations, and outperforms existing methods.
arXiv Detail & Related papers (2026-02-23T18:19:46Z) - Aegis: Towards Governance, Integrity, and Security of AI Voice Agents [52.7512082818639]
We propose Aegis, a framework for the governance, integrity, and security of voice agents.<n>We evaluate the framework through case studies in banking call centers, IT Support, and logistics.<n>We observe systematic differences across model families, with open-weight models exhibiting higher susceptibility.
arXiv Detail & Related papers (2026-02-07T05:51:36Z) - Fuzzychain-edge: A novel Fuzzy logic-based adaptive Access control model for Blockchain in Edge Computing [3.542991606199518]
This research contributes significantly to advancing privacy-preserving, secure, and traceable solutions in IoT environments.<n>It lays the groundwork for future innovations in decentralized technologies and their applications in critical domains such as healthcare and beyond.
arXiv Detail & Related papers (2026-01-15T06:23:43Z) - Towards Verifiably Safe Tool Use for LLM Agents [53.55621104327779]
Large language model (LLM)-based AI agents extend capabilities by enabling access to tools such as data sources, APIs, search engines, code sandboxes, and even other agents.<n>LLMs may invoke unintended tool interactions and introduce risks, such as leaking sensitive data or overwriting critical records.<n>Current approaches to mitigate these risks, such as model-based safeguards, enhance agents' reliability but cannot guarantee system safety.
arXiv Detail & Related papers (2026-01-12T21:31:38Z) - POLARIS: Cross-Domain Access Control via Verifiable Identity and Policy-Based Authorization [1.184563171189161]
Cross-domain access control involves access to resources across different organizations, institutions, or applications.<n>Traditional access control faces challenges in identity dispersion, privacy leakage, and diversified permission requirements.<n>We propose POLARIS, a policy-based, verifiable and privacy-preserving access control across different domains.
arXiv Detail & Related papers (2025-11-27T01:42:42Z) - Authorization of Knowledge-base Agents in an Intent-based Management Function [0.07646713951724012]
We propose an enhanced authorization framework that integrates roles and functional attributes with agent roles.<n>Our approach ensures that agents are granted only the minimal necessary privileges towards knowledge graphs.
arXiv Detail & Related papers (2025-10-22T07:38:01Z) - Identity and Access Management for the Computing Continuum [3.27091747384484]
We propose a Zero-Trust (ZT) access control solution that leverages decentralized identification and authentication mechanisms.<n>We employ Relationship-Based Access Control (ReBAC) to define policies that capture the evolving trust relationships inherent in the continuum.
arXiv Detail & Related papers (2025-06-11T09:45:25Z) - ACRIC: Securing Legacy Communication Networks via Authenticated Cyclic Redundancy Integrity Check [98.34702864029796]
Recent security incidents in safety-critical industries exposed how the lack of proper message authentication enables attackers to inject malicious commands or alter system behavior.<n>These shortcomings have prompted new regulations that emphasize the pressing need to strengthen cybersecurity.<n>We introduce ACRIC, a message authentication solution to secure legacy industrial communications.
arXiv Detail & Related papers (2024-11-21T18:26:05Z) - Pareto Control Barrier Function for Inner Safe Set Maximization Under Input Constraints [50.920465513162334]
We introduce the PCBF algorithm to maximize the inner safe set of dynamical systems under input constraints.<n>We validate its effectiveness through comparison with Hamilton-Jacobi reachability for an inverted pendulum and through simulations on a 12-dimensional quadrotor system.<n>Results show that the PCBF consistently outperforms existing methods, yielding larger safe sets and ensuring safety under input constraints.
arXiv Detail & Related papers (2024-10-05T18:45:19Z) - GPT, Ontology, and CAABAC: A Tripartite Personalized Access Control
Model Anchored by Compliance, Context and Attribute [3.932043050439443]
This study presents Generative Transformer (GPT), medical access and context-Aware Attribute-Based Access Control (BACT)
Unlike traditional models, GP-Onto-CAABACT dynamically interprets policies and adapts to changing healthcare and legal environments.
Findings suggest its broader applicability in sectors where access control must meet stringent compliance and situational standards.
arXiv Detail & Related papers (2024-03-13T05:30:30Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - Recursively Feasible Probabilistic Safe Online Learning with Control Barrier Functions [60.26921219698514]
We introduce a model-uncertainty-aware reformulation of CBF-based safety-critical controllers.
We then present the pointwise feasibility conditions of the resulting safety controller.
We use these conditions to devise an event-triggered online data collection strategy.
arXiv Detail & Related papers (2022-08-23T05:02:09Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.