메뉴 건너뛰기




Volumn 9, Issue 3, 2012, Pages 332-344

Detecting anomalous insiders in collaborative information systems

Author keywords

data mining; insider threat detection; Privacy; social network analysis

Indexed keywords

ANOMALY DETECTION; DATA MINING; DATA PRIVACY; DIAGNOSIS; DISTRIBUTED COMPUTER SYSTEMS; ELECTRONIC DOCUMENT EXCHANGE; INFORMATION SYSTEMS; INFORMATION USE; SEMANTICS; SOCIAL NETWORKING (ONLINE);

EID: 84863381941     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2012.11     Document Type: Article
Times cited : (81)

References (56)
  • 1
    • 10944272139 scopus 로고    scopus 로고
    • Friends and neighbors on the Web
    • DOI 10.1016/S0378-8733(03)00009-1, PII S0378873303000091
    • L.A. Adamic and E. Adar, "Friends and Neighbors on the Web," Social Networks, vol. 25, no. 3, pp. 211-230, 2003. (Pubitemid 36831776)
    • (2003) Social Networks , vol.25 , Issue.3 , pp. 211-230
    • Adamic, L.A.1    Adar, E.2
  • 2
    • 84856165181 scopus 로고    scopus 로고
    • Preventing information leakage between collaborating organisations
    • M. Alawneh and I. Abbadi, "Preventing Information Leakage between Collaborating Organisations," Proc. 10th Int'l Conf. Electronic Commerce, pp. 185-194, 2008.
    • (2008) Proc. 10th Int'l Conf. Electronic Commerce , pp. 185-194
    • Alawneh, M.1    Abbadi, I.2
  • 3
    • 0030393538 scopus 로고    scopus 로고
    • Walking away from the desktop computer: Distributed collaboration and mobility in a product design team
    • V. Bellotti and S. Bly, "Walking Away from the Desktop Computer: Distributed Collaboration and Mobility in a Product Design Team," Proc. ACM Conf. Computer Supported Cooperative Work, pp. 209-218, 1996.
    • (1996) Proc. ACM Conf. Computer Supported Cooperative Work , pp. 209-218
    • Bellotti, V.1    Bly, S.2
  • 5
    • 79959638566 scopus 로고    scopus 로고
    • Using statistical and machine learning to help institutions detect suspicious access to electronic health records
    • A.A. Boxwala, J. Kim, J.M. Grillo, and L.O. Machado, "Using Statistical and Machine Learning to Help Institutions Detect Suspicious Access to Electronic Health Records," J. Am. Medical Informatics Assoc., vol. 18, pp. 498-505, 2011.
    • J. Am. Medical Informatics Assoc. , vol.18 , Issue.2011 , pp. 498-505
    • Boxwala, A.A.1    Kim, J.2    Grillo, J.M.3    Machado, L.O.4
  • 6
    • 45749089618 scopus 로고    scopus 로고
    • Purpose based access control for privacy protection in relational database systems
    • J. Byun and N. Li, "Purpose Based Access Control for Privacy Protection in Relational Database Systems," Int'l J. Very Large Data Bases, vol. 17, pp. 603-619, 2008.
    • (2008) Int'l J. Very Large Data Bases , vol.17 , pp. 603-619
    • Byun, J.1    Li, N.2
  • 7
    • 33748081445 scopus 로고    scopus 로고
    • TrustBAC - Integrating trust relationships into the RBAC model for access control in open systems
    • SACMAT 2006: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies
    • S. Chakraborty and I. Ray, "TrustBac: Integrating Trust Relationships into the RBAC Model for Access Control in Open Systems," Proc. 11th ACM Symp. Access Control Models and Technologies, pp. 49-58, 2006. (Pubitemid 44300741)
    • (2006) Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT , vol.2006 , pp. 49-58
    • Chakraborty, S.1    Ray, I.2
  • 8
    • 10644280105 scopus 로고    scopus 로고
    • Intelligence and security informatics for homeland security: Information, communication, and transportation
    • Dec.
    • H. Chen, F. Wang, and D. Zeng, "Intelligence and Security Informatics for Homeland Security: Information, Communication, and Transportation," IEEE Trans. Intelligent Transportation Systems, vol. 5, no. 4, pp. 329-341, Dec. 2004.
    • (2004) IEEE Trans. Intelligent Transportation Systems , vol.5 , Issue.4 , pp. 329-341
    • Chen, H.1    Wang, F.2    Zeng, D.3
  • 9
    • 0442298972 scopus 로고    scopus 로고
    • COPLINK: Managing law enforcement data and knowledge
    • H. Chen, D. Zeng, H. Atabakhsh, W. Wyzga, and J. Schroeder, "COPLINK: Managing Law Enforcement Data and Knowledge," Comm. ACM, vol. 46, no. 1, pp. 28-34, 2003.
    • (2003) Comm. ACM , vol.46 , Issue.1 , pp. 28-34
    • Chen, H.1    Zeng, D.2    Atabakhsh, H.3    Wyzga, W.4    Schroeder, J.5
  • 16
    • 73549125255 scopus 로고
    • A study of collaborative group work with and without computer-based support
    • J. George, G. Easton, J. Nunamaker, and G. Northcraft, "A Study of Collaborative Group Work with and without Computer-Based Support," Information Systems Research, vol. 1, no. 4, pp. 394-415, 1990.
    • (1990) Information Systems Research , vol.1 , Issue.4 , pp. 394-415
    • George, J.1    Easton, G.2    Nunamaker, J.3    Northcraft, G.4
  • 18
    • 16544393309 scopus 로고    scopus 로고
    • Supporting communication in an integrated patient record system
    • D. Giuse, "Supporting Communication in an Integrated Patient Record System," Proc. Ann. Symp. Am. Medical Informatics Assoc., p. 1065, 2003.
    • (2003) Proc. Ann. Symp. Am. Medical Informatics Assoc. , pp. 1065
    • Giuse, D.1
  • 19
    • 44549088088 scopus 로고    scopus 로고
    • Collective knowledge systems: Where the social web meets the semantic web
    • T. Gruber, "Collective Knowledge Systems: Where the Social Web Meets the Semantic Web," J. Web Semantics, vol. 6, no. 1, pp. 4-13, 2007.
    • (2007) J. Web Semantics , vol.6 , Issue.1 , pp. 4-13
    • Gruber, T.1
  • 20
    • 80053461711 scopus 로고    scopus 로고
    • Experience-based access management: A life-cycle framework for identity and access management systems
    • Sept./Oct.
    • C. Gunter, D. Liebovitz, and B. Malin, "Experience-Based Access Management: A Life-Cycle Framework for Identity and Access Management Systems," IEEE Security and Privacy Magazine, vol. 9, no. 5, pp. 48-55, Sept./Oct. 2011.
    • (2011) IEEE Security and Privacy Magazine , vol.9 , Issue.5 , pp. 48-55
    • Gunter, C.1    Liebovitz, D.2    Malin, B.3
  • 24
    • 4243128193 scopus 로고    scopus 로고
    • On clusterings: Good, bad and spectral
    • R. Kannan, S. Vempala, and A. Vetta, "On Clusterings: Good, Bad and Spectral," J. ACM, vol. 51, no. 3, pp. 497-515, 2004.
    • (2004) J. ACM , vol.51 , Issue.3 , pp. 497-515
    • Kannan, R.1    Vempala, S.2    Vetta, A.3
  • 29
    • 52949106331 scopus 로고    scopus 로고
    • Statistical properties of community structure in large social and information networks
    • J. Leskovec, K. Lang, A. Dasgupta, and M. Mahoney, "Statistical Properties of Community Structure in Large Social and Information Networks," Proc. 17th Int'l Conf. World Wide Web, pp. 695-704, 2008.
    • (2008) Proc. 17th Int'l Conf. World Wide Web , pp. 695-704
    • Leskovec, J.1    Lang, K.2    Dasgupta, A.3    Mahoney, M.4
  • 31
    • 0036321445 scopus 로고    scopus 로고
    • Use of k-nearest neighbor classifier for intrusion detection
    • DOI 10.1016/S0167-4048(02)00514-X
    • Y. Liao and V.R. Vemuri, "Use of k-Nearest Neighbor Classifier for Intrusion Detection," J. Computer Security, vol. 21, no. 5, pp. 439-448, 2002. (Pubitemid 34835644)
    • (2002) Computers and Security , vol.21 , Issue.5 , pp. 439-448
    • Liao, Y.1    Vemuri, V.R.2
  • 32
    • 15244345773 scopus 로고    scopus 로고
    • Anonymous trust: Digital rights management using broadcast encryption
    • June
    • J. Lotspiech, S. Nusser, and F. Pestoni, "Anonymous Trust: Digital Rights Management Using Broadcast Encryption," Proc. IEEE, vol. 92, no. 6, pp. 898-902, June 2004.
    • (2004) Proc. IEEE , vol.92 , Issue.6 , pp. 898-902
    • Lotspiech, J.1    Nusser, S.2    Pestoni, F.3
  • 33
    • 79952774177 scopus 로고    scopus 로고
    • Learning relational policies from electronic health record access logs
    • B. Malin, S. Nyemba, and J. Paulett, "Learning Relational Policies from Electronic Health Record Access Logs," J. Biomedical Informatics, vol. 44, no. 2, pp. 333-342, 2011.
    • (2011) J. Biomedical Informatics , vol.44 , Issue.2 , pp. 333-342
    • Malin, B.1    Nyemba, S.2    Paulett, J.3
  • 34
    • 33745956063 scopus 로고    scopus 로고
    • Reviewing the benefits and costs of electronic health records and associated patient safety technologies
    • DOI 10.1007/s10916-005-7988-x
    • N. Menachemi and R. Brooks, "Reviewing the Benefits and Costs of Electronic Health Records and Associated Patient Safety Technologies," J. Medical Systems, vol. 30, no. 3, pp. 159-168, 2008. (Pubitemid 44060918)
    • (2006) Journal of Medical Systems , vol.30 , Issue.3 , pp. 159-168
    • Menachemi, N.1    Brooks, R.G.2
  • 36
    • 42749099621 scopus 로고    scopus 로고
    • Properties of highly clustered networks
    • 026121
    • M. Newman, "Properties of Highly Clustered Networks," Physical Rev. E, vol. 68, no. 026121, pp. 1-6, 2003.
    • (2003) Physical Rev. E , vol.68 , pp. 1-6
    • Newman, M.1
  • 39
    • 55549122324 scopus 로고    scopus 로고
    • Situation-based access control: Privacy management via modeling of patient data access scenarios
    • M. Peleg, D. Beimel, D. Dori, and Y. Denekamp, "Situation-Based Access Control: Privacy Management via Modeling of Patient Data Access Scenarios," J. Biomedical Informatics, vol. 41, no. 6, pp. 1028-1040, 2008.
    • (2008) J. Biomedical Informatics , vol.41 , Issue.6 , pp. 1028-1040
    • Peleg, M.1    Beimel, D.2    Dori, D.3    Denekamp, Y.4
  • 41
    • 4243116398 scopus 로고    scopus 로고
    • Countering terrorism through information technology
    • R. Popp, "Countering Terrorism through Information Technology," Comm. ACM, vol. 47, no. 3, pp. 36-43, 2004.
    • (2004) Comm. ACM , vol.47 , Issue.3 , pp. 36-43
    • Popp, R.1
  • 43
    • 39049126192 scopus 로고    scopus 로고
    • A study of access control requirements for healthcare systems based on audit trails from access logs
    • L. Røstad and O. Edsberg, "A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access Logs," Proc. 22nd Ann. Computer Security Applications Conf., pp. 175-186, 2006.
    • (2006) Proc. 22nd Ann. Computer Security Applications Conf. , pp. 175-186
    • Røstad, L.1    Edsberg, O.2
  • 44
    • 0036395373 scopus 로고    scopus 로고
    • A framework for understanding and predicting insider attacks
    • DOI 10.1016/S0167-4048(02)01009-X
    • E. Schultz, "A Framework for Understanding and Predicting Insider Attacks," Computers and Security, vol. 21, no. 6, pp. 526-531, 2002. (Pubitemid 35186246)
    • (2002) Computers and Security , vol.21 , Issue.6 , pp. 526-531
    • Schultz, E.E.1
  • 51
    • 0002841051 scopus 로고    scopus 로고
    • Task-based authorization controls (tbac): A family of models for active and enterprise-oriented autorization management
    • R. Thomas and S. Sandhu, "Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management," Proc. IFIP 11th Int'l Conf. Database Security, pp. 166-181, 1997.
    • (1997) Proc. IFIP 11th Int'l Conf. Database Security , pp. 166-181
    • Thomas, R.1    Sandhu, S.2
  • 55
    • 34247540250 scopus 로고    scopus 로고
    • Games with a purpose
    • June
    • L. von Ahn, "Games with a Purpose," Computer, vol. 39, no. 6, pp. 96-98, June 2006.
    • (2006) Computer , vol.39 , Issue.6 , pp. 96-98
    • Von Ahn, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.