메뉴 건너뛰기




Volumn 5905 LNCS, Issue , 2009, Pages 208-221

Automatic identification of critical data items in a database to mitigate the effects of malicious insiders

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATIC IDENTIFICATION; COMPUTER SYSTEM SECURITY; CRITICAL DATA; DATA DEPENDENCIES; DATA ITEMS; DATA SYSTEMS; DIRECTED GRAPHS; FUTURE TECHNOLOGIES; INSIDER THREAT; INTRUSION DETECTION SYSTEMS; MALICIOUS INSIDERS; MISSION CRITICAL; SECURITY ENGINEERS; SECURITY MEASURE;

EID: 71549155293     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-10772-6_16     Document Type: Conference Paper
Times cited : (6)

References (16)
  • 1
    • 33646031830 scopus 로고    scopus 로고
    • Ray, I., Poolsappasit, N.: Using Attack Trees to Identify Malicious Attacks from Authorized Insiders. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, 3679, pp. 231-246. Springer, Heidelberg (2005)
    • Ray, I., Poolsappasit, N.: Using Attack Trees to Identify Malicious Attacks from Authorized Insiders. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 231-246. Springer, Heidelberg (2005)
  • 3
    • 71549114330 scopus 로고    scopus 로고
    • Zuo, Y., Panda, B.: A Service Oriented System Based Information Flow Model for Damage Assessment. In: 6th IFIP WG 11.5 Working Conference on Integrity and Internal Control in Information Systems, Lausanne, Switzerland, November 13-14 (2003)
    • Zuo, Y., Panda, B.: A Service Oriented System Based Information Flow Model for Damage Assessment. In: 6th IFIP WG 11.5 Working Conference on Integrity and Internal Control in Information Systems, Lausanne, Switzerland, November 13-14 (2003)
  • 5
    • 24644501524 scopus 로고    scopus 로고
    • Insider Threat Integrated Process Team, Department of Defense DoD-IPT, U.S. Department of Defense
    • Insider Threat Integrated Process Team, Department of Defense (DoD-IPT), 2000. DoD Insider Threat Mitigation, U.S. Department of Defense (2000)
    • (2000) DoD Insider Threat Mitigation
  • 7
    • 4243198165 scopus 로고    scopus 로고
    • Enemy at the Gate: Threats to Information Security
    • Whitman, M.: Enemy at the Gate: Threats to Information Security. Communications of the ACM 46(8) (2003)
    • (2003) Communications of the ACM , vol.46 , Issue.8
    • Whitman, M.1
  • 9
    • 38149079272 scopus 로고    scopus 로고
    • Understanding the Insider Threat
    • March Workshop, RAND National Defense Research Institute
    • Anderson, R., Brackney, R.: Understanding the Insider Threat. In: Proceedings of a March 2004 Workshop, RAND National Defense Research Institute (2004)
    • (2004) Proceedings of a
    • Anderson, R.1    Brackney, R.2
  • 15
    • 24944445620 scopus 로고    scopus 로고
    • Meza, B., Burns, P., Eavenson, M., Palaniswami, D., Sheth, A.: An ontological approach to the document access problem of insider threat. In: Kantor, P., Muresan, G., Roberts, F., Zeng, D.D., Wang, F.-Y., Chen, H., Merkle, R.C. (eds.) ISI 2005. LNCS, 3495, pp. 486-491. Springer, Heidelberg (2005)
    • Meza, B., Burns, P., Eavenson, M., Palaniswami, D., Sheth, A.: An ontological approach to the document access problem of insider threat. In: Kantor, P., Muresan, G., Roberts, F., Zeng, D.D., Wang, F.-Y., Chen, H., Merkle, R.C. (eds.) ISI 2005. LNCS, vol. 3495, pp. 486-491. Springer, Heidelberg (2005)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.