메뉴 건너뛰기




Volumn 36, Issue 3, 2006, Pages 487-497

Autonomic-computing approach to secure knowledge management: A game-theoretic analysis

Author keywords

Autonomic computing; Game theory; Intrusion detection; Secure knowledge management

Indexed keywords

COGNITIVE SYSTEMS; GAME THEORY; INFORMATION TECHNOLOGY; MATHEMATICAL MODELS; SECURITY OF DATA;

EID: 33646896924     PISSN: 10834427     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSMCA.2006.871724     Document Type: Article
Times cited : (9)

References (42)
  • 4
    • 9744248703 scopus 로고    scopus 로고
    • "Review: Knowledge management and knowledge management systems: Conceptual foundations and research issues"
    • Mar
    • M. Alavi and D. E. Leidner, "Review: Knowledge management and knowledge management systems: Conceptual foundations and research issues," MIS Q., vol. 25, no. 1, pp. 107-136, Mar. 2001.
    • (2001) MIS Q. , vol.25 , Issue.1 , pp. 107-136
    • Alavi, M.1    Leidner, D.E.2
  • 5
    • 0032377899 scopus 로고    scopus 로고
    • "The eleven deadliest sins of knowledge management"
    • L. Fahey and L. Prusak, "The eleven deadliest sins of knowledge management," Calif. Manage. Rev., vol. 40, no. 3, pp. 265-276, 1998.
    • (1998) Calif. Manage. Rev. , vol.40 , Issue.3 , pp. 265-276
    • Fahey, L.1    Prusak, L.2
  • 6
    • 0034188780 scopus 로고    scopus 로고
    • "Balancing act: How to capture knowledge without killing it"
    • May/Jun
    • J. S. Brown and P. Duguid, "Balancing act: How to capture knowledge without killing it," Harvard Bus. Rev., vol. 78, no. 3, pp. 73-80, May/Jun. 2000.
    • (2000) Harvard Bus. Rev. , vol.78 , Issue.3 , pp. 73-80
    • Brown, J.S.1    Duguid, P.2
  • 7
    • 0037253062 scopus 로고    scopus 로고
    • "The vision of autonomic computing"
    • Jan
    • J. Kephart and D. Chess, "The vision of autonomic computing," Computer, vol. 36, no. 1, pp. 41-50, Jan. 2003.
    • (2003) Computer , vol.36 , Issue.1 , pp. 41-50
    • Kephart, J.1    Chess, D.2
  • 8
    • 33646872977 scopus 로고    scopus 로고
    • "Autonomic computing blueprint unveiled"
    • P. MacInnis, "Autonomic computing blueprint unveiled," Comput. Canada, vol. 29, no. 8, p. 4, 2003.
    • (2003) Comput. Canada , vol.29 , Issue.8 , pp. 4
    • MacInnis, P.1
  • 9
    • 0037233184 scopus 로고    scopus 로고
    • "Autonomic computing: The next e-business step"
    • J. Teresko, "Autonomic computing: The next e-business step," Ind. Week, vol. 252, no. 1, p. 19, 2003.
    • (2003) Ind. Week , vol.252 , Issue.1 , pp. 19
    • Teresko, J.1
  • 10
    • 9944238300 scopus 로고    scopus 로고
    • "Towards autonomic computing systems"
    • H. Tianfield and R. Unland, "Towards autonomic computing systems," Eng. Appl. Artif. Intell., vol. 17, no. 7, pp. 689-699, 2004.
    • (2004) Eng. Appl. Artif. Intell. , vol.17 , Issue.7 , pp. 689-699
    • Tianfield, H.1    Unland, R.2
  • 15
    • 0037232265 scopus 로고    scopus 로고
    • "Security in an autonomic computing environment"
    • D. M. Chess, C. C. Palmer, and S. R. White, "Security in an autonomic computing environment," IBM Syst. J., vol. 42, no. 1, pp. 107-118, 2003.
    • (2003) IBM Syst. J. , vol.42 , Issue.1 , pp. 107-118
    • Chess, D.M.1    Palmer, C.C.2    White, S.R.3
  • 16
    • 33646870936 scopus 로고    scopus 로고
    • "Denial of service intrusion detection using time dependent deterministic finite automata"
    • Troy, NY, Oct
    • J. Branch, A. Bivens, C. Y. Chan, T. K. Lee, and B. Szymanski, "Denial of service intrusion detection using time dependent deterministic finite automata," in Proc. Research Conf., Troy, NY, Oct. 2002, pp. 45-51.
    • (2002) Proc. Research Conf. , pp. 45-51
    • Branch, J.1    Bivens, A.2    Chan, C.Y.3    Lee, T.K.4    Szymanski, B.5
  • 17
    • 0004048154 scopus 로고
    • "Computer security threat and monitoring surveillance"
    • James P. Anderson Co., FortWashington, PA, Tech. Rep. 79F26400
    • J. P. Anderson, "Computer security threat and monitoring surveillance," James P. Anderson Co., FortWashington, PA, Tech. Rep. 79F26400, 1980.
    • (1980)
    • Anderson, J.P.1
  • 18
    • 84928016636 scopus 로고    scopus 로고
    • "The base-rate fallacy and the difficulty of intrusion detection"
    • Aug
    • S. Axelsson, "The base-rate fallacy and the difficulty of intrusion detection," ACM Trans. Inf. Syst. Secur., vol. 3, no. 3, pp. 186-205, Aug. 2000.
    • (2000) ACM Trans. Inf. Syst. Secur. , vol.3 , Issue.3 , pp. 186-205
    • Axelsson, S.1
  • 19
    • 35248836533 scopus 로고    scopus 로고
    • "Using specification-based intrusion detection for automated response"
    • Pittsburgh, PA, Sep. 8-10
    • I. Balepin, S. Maltsev, J. Rowe, and K. Levitt, "Using specification-based intrusion detection for automated response," in Proc. 6th Int. Symp. RAID, Pittsburgh, PA, Sep. 8-10, 2003, pp. 136-154.
    • (2003) Proc. 6th Int. Symp. RAID , pp. 136-154
    • Balepin, I.1    Maltsev, S.2    Rowe, J.3    Levitt, K.4
  • 20
    • 0036093229 scopus 로고    scopus 로고
    • "Toward cost-sensitive modeling for intrusion detection and response"
    • W. Lee, W. Fan, M. Miller, S. Stolfo, and E. Zadok, "Toward cost-sensitive modeling for intrusion detection and response," J. Comput. Secur., vol. 10, no. 1, pp. 5-22, 2002.
    • (2002) J. Comput. Secur. , vol.10 , Issue.1 , pp. 5-22
    • Lee, W.1    Fan, W.2    Miller, M.3    Stolfo, S.4    Zadok, E.5
  • 21
  • 23
    • 85084164032 scopus 로고    scopus 로고
    • "Automated response using system call delays"
    • Aug. 14-17
    • A. Somayaji and S. Forrest, "Automated response using system call delays," in Proc. 9th USENIX Security Symp., Aug. 14-17, 2000, pp. 185-198.
    • (2000) Proc. 9th USENIX Security Symp. , pp. 185-198
    • Somayaji, A.1    Forrest, S.2
  • 24
    • 84990029315 scopus 로고    scopus 로고
    • "The economics of information security investment"
    • Nov
    • L. A. Gordon and M. P. Loeb, "The economics of information security investment," ACM Trans. Inf. Syst. Secur., vol. 5, no. 4, pp. 438-457, Nov. 2002.
    • (2002) ACM Trans. Inf. Syst. Secur. , vol.5 , Issue.4 , pp. 438-457
    • Gordon, L.A.1    Loeb, M.P.2
  • 25
    • 4243109556 scopus 로고    scopus 로고
    • "A model for evaluating IT security systems"
    • Jul
    • H. Cavusoglu, B. K. Mishra, and S. Raghunathan, "A model for evaluating IT security systems," Commun. ACM, vol. 47, no. 7, pp. 87-92, Jul. 2004.
    • (2004) Commun. ACM , vol.47 , Issue.7 , pp. 87-92
    • Cavusoglu, H.1    Mishra, B.K.2    Raghunathan, S.3
  • 26
    • 18944385964 scopus 로고    scopus 로고
    • "The value of intrusion detection systems in information technology security architectures"
    • Mar
    • H. Cavusoglu, B. K. Mishra, and S. Raghunathan, "The value of intrusion detection systems in information technology security architectures," Inf. Syst. Res., vol. 16, no. 1, pp. 28-46, Mar. 2005.
    • (2005) Inf. Syst. Res. , vol.16 , Issue.1 , pp. 28-46
    • Cavusoglu, H.1    Mishra, B.K.2    Raghunathan, S.3
  • 27
    • 14344258545 scopus 로고    scopus 로고
    • "Incentive-based modeling and inference of attacker intent, objectives, and strategies"
    • P. Liu and W. Zang, "Incentive-based modeling and inference of attacker intent, objectives, and strategies," in Proc. 10th ACM Conf. Computer Communications Security, 2003, pp. 179-189.
    • (2003) Proc. 10th ACM Conf. Computer Communications Security , pp. 179-189
    • Liu, P.1    Zang, W.2
  • 28
    • 0042474230 scopus 로고    scopus 로고
    • "Detecting network intrusions via sampling: A game theoretic approach"
    • [Online]. Available: www.ieee-infocom.org/2003/papers/46_02.PDF
    • M. Kodialam and T. V. Lakshman. (2003). "Detecting network intrusions via sampling: A game theoretic approach," in Proc. IEEE INFOCOM. [Online]. Available: www.ieee-infocom.org/2003/papers/46_02.PDF
    • (2003) Proc. IEEE INFOCOM
    • Kodialam, M.1    Lakshman, T.V.2
  • 29
    • 18144409187 scopus 로고    scopus 로고
    • "Selfish behavior and stability of the Internet: A game-theoretic analysis of TCP"
    • Pittsburgh, PA, Aug
    • A. Akella, S. Seshan, R. Karp, and S. Shenker, "Selfish behavior and stability of the Internet: A game-theoretic analysis of TCP," in Proc. ACM SIGCOMM, Pittsburgh, PA, Aug. 2002, pp. 117-130.
    • (2002) Proc. ACM SIGCOMM , pp. 117-130
    • Akella, A.1    Seshan, S.2    Karp, R.3    Shenker, S.4
  • 30
    • 0029533860 scopus 로고
    • "Making greed work in networks: A game-theoretic analysis of switch service disciplines"
    • Dec
    • S. Shenker, "Making greed work in networks: A game-theoretic analysis of switch service disciplines," IEEE/ACM Trans. Netw., vol. 3, no. 6, pp. 819-831, Dec. 1995.
    • (1995) IEEE/ACM Trans. Netw. , vol.3 , Issue.6 , pp. 819-831
    • Shenker, S.1
  • 32
    • 84966620150 scopus 로고    scopus 로고
    • "Testing and evaluating computer intrusion detection systems"
    • Jul
    • R. Durst, T. Champion, B. Witten, E. Miller, and L. Spagnuolo, "Testing and evaluating computer intrusion detection systems," Commun. ACM, vol. 42, no. 7, pp. 53-61, Jul. 1999.
    • (1999) Commun. ACM , vol.42 , Issue.7 , pp. 53-61
    • Durst, R.1    Champion, T.2    Witten, B.3    Miller, E.4    Spagnuolo, L.5
  • 33
    • 84962260018 scopus 로고    scopus 로고
    • "Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation"
    • R. P. Lippmann, D. J. Fried, I. Graf, J. W. Haines, K. R. Kendall, D. McClung et al., "Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation," in Proc. DISCEX, 2000, vol. 2, pp. 12-26.
    • (2000) Proc. DISCEX , vol.2 , pp. 12-26
    • Lippmann, R.P.1    Fried, D.J.2    Graf, I.3    Haines, J.W.4    Kendall, K.R.5    McClung, D.6
  • 35
    • 35048885009 scopus 로고    scopus 로고
    • "Anomalous payload-based network intrusion detection"
    • Sep
    • K. Wang and S. Stolfo, "Anomalous payload-based network intrusion detection," in Proc. RAID, Sep. 2004, pp. 203-222.
    • (2004) Proc. RAID , pp. 203-222
    • Wang, K.1    Stolfo, S.2
  • 37
    • 2742611322 scopus 로고
    • "Deterrence and the design of treaty verification systems"
    • Sep./Oct
    • S. Weissenberger, "Deterrence and the design of treaty verification systems," IEEE Trans. Syst., Man, Cybern., vol. 22, no. 5, pp. 903-915, Sep./Oct. 1992.
    • (1992) IEEE Trans. Syst., Man, Cybern. , vol.22 , Issue.5 , pp. 903-915
    • Weissenberger, S.1
  • 38
    • 0001936936 scopus 로고
    • "Strategic considerations in auditing"
    • Oct
    • J. C. Fellingham and P. Newman, "Strategic considerations in auditing," Account. Rev., vol. 60, no. 4, pp. 634-650, Oct. 1985.
    • (1985) Account. Rev. , vol.60 , Issue.4 , pp. 634-650
    • Fellingham, J.C.1    Newman, P.2
  • 39
    • 27644551591 scopus 로고    scopus 로고
    • "Corporate software piracy prevention and detection: An analysis of strategies"
    • B. Mishra, T. S. Raghu, and A. Prasad, "Corporate software piracy prevention and detection: An analysis of strategies," J. Organ. Comput. Electron. Commer., vol. 15, no. 3, pp. 223-252, 2005.
    • (2005) J. Organ. Comput. Electron. Commer. , vol.15 , Issue.3 , pp. 223-252
    • Mishra, B.1    Raghu, T.S.2    Prasad, A.3
  • 40
    • 0034270431 scopus 로고    scopus 로고
    • "Defending yourself: The role of intrusion detection systems"
    • Sep./Oct
    • J. McHugh, A. C. Christie, and J. Allen, "Defending yourself: The role of intrusion detection systems," IEEE Softw., vol. 17, no. 5, pp. 42-51, Sep./Oct. 2000.
    • (2000) IEEE Softw. , vol.17 , Issue.5 , pp. 42-51
    • McHugh, J.1    Christie, A.C.2    Allen, J.3
  • 41
    • 27644518674 scopus 로고    scopus 로고
    • "Optimal redundancy allocation for information technology disaster recovery in the network economy"
    • Jul./Sep
    • B. Shao, "Optimal redundancy allocation for information technology disaster recovery in the network economy," IEEE Trans. Dependable Secure Comput., vol. 2, no. 3, pp. 262-267, Jul./Sep. 2005.
    • (2005) IEEE Trans. Dependable Secure Comput. , vol.2 , Issue.3 , pp. 262-267
    • Shao, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.