ExplorerComputer ScienceCybersecurity
Research PaperResearchia:202602.07005

IPBAC: Interaction Provenance-Based Access Control for Secure and Privacy-Aware Systems

Sharif Noor Zisad

Abstract

Traditional access control systems, including RBAC, face significant limitations such as inflexible role definitions, difficulty handling dynamic scenarios, and lack of detailed accountability and traceability. To this end, we introduce the Interaction Provenance-based Access Control (IPBAC) model. In this paper, we explore the integration of interaction provenance with access control to overcome these limitations. Interaction provenance refers to the detailed recording of actions and interactio...

Submitted: February 7, 2026Subjects: Cybersecurity; Computer Science

Description / Details

Traditional access control systems, including RBAC, face significant limitations such as inflexible role definitions, difficulty handling dynamic scenarios, and lack of detailed accountability and traceability. To this end, we introduce the Interaction Provenance-based Access Control (IPBAC) model. In this paper, we explore the integration of interaction provenance with access control to overcome these limitations. Interaction provenance refers to the detailed recording of actions and interactions within a system, capturing comprehensive metadata such as the identity of the actor, the time of an action, and the context. IPBAC ensures stronger protection against unauthorized access, enhances traceability for auditing and compliance, and supports adaptive security policies. This provenance-based access control not only strengthens security, but also provides a robust framework for auditing and compliance.


Source: arXiv:2602.07722v1 - http://arxiv.org/abs/2602.07722v1 PDF: https://arxiv.org/pdf/2602.07722v1 Original Link: http://arxiv.org/abs/2602.07722v1

Please sign in to join the discussion.

No comments yet. Be the first to share your thoughts!

Access Paper
View Source PDF
Submission Info
Date:
Feb 7, 2026
Topic:
Computer Science
Area:
Cybersecurity
Comments:
0
Bookmark