메뉴 건너뛰기




Volumn , Issue , 2012, Pages 167-176

A trust-and-risk aware RBAC framework: Tackling insider threat

Author keywords

Inference threat; Insider threat; Risk management; Role based access control; Trust

Indexed keywords

ASSESSMENT PROCESS; EXPERIMENTAL EVALUATION; INFERENCE THREAT; INSIDER ATTACK; INSIDER THREAT; RISK EXPOSURE; ROLE ACTIVATION; ROLE-BASED ACCESS CONTROL; ROLE-BASED ACCESS CONTROL MODEL; TRUST;

EID: 84864066552     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2295136.2295168     Document Type: Conference Paper
Times cited : (41)

References (33)
  • 2
    • 84956993736 scopus 로고    scopus 로고
    • Role-based authorization constraints specification
    • November
    • G.-J. Ahn and R. Sandhu. Role-based authorization constraints specification. ACM Trans. Inf. Syst. Secur., 3:207-226, November 2000.
    • (2000) ACM Trans. Inf. Syst. Secur. , vol.3 , pp. 207-226
    • Ahn, G.-J.1    Sandhu, R.2
  • 7
    • 0034314077 scopus 로고    scopus 로고
    • Secure databases: Constraints, inference channels, and monitoring disclosures
    • IEEE Transactions on
    • A. Brodsky, C. Farkas, and S. Jajodia. Secure databases: constraints, inference channels, and monitoring disclosures. Knowledge and Data Engineering, IEEE Transactions on, 2000.
    • (2000) Knowledge and Data Engineering
    • Brodsky, A.1    Farkas, C.2    Jajodia, S.3
  • 9
    • 33748081445 scopus 로고    scopus 로고
    • TrustBAC - Integrating trust relationships into the RBAC model for access control in open systems
    • SACMAT 2006: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies
    • S. Chakraborty and I. Ray. Trustbac: integrating trust relationships into the rbac model for access control in open systems. In Proc. of the 11th ACM symposium on Access control models and technologies, SACMAT '06, pp. 49-58, New York, NY, USA, 2006. ACM. (Pubitemid 44300741)
    • (2006) Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT , vol.2006 , pp. 49-58
    • Chakraborty, S.1    Ray, I.2
  • 11
    • 46649105922 scopus 로고    scopus 로고
    • Protection of database security via collaborative inference detection
    • IEEE Transactions on aug.
    • Y. Chen and W. Chu. Protection of database security via collaborative inference detection. Knowledge and Data Engineering, IEEE Transactions on, 20(8):1013-1027, aug. 2008.
    • (2008) Knowledge and Data Engineering , vol.20 , Issue.8 , pp. 1013-1027
    • Chen, Y.1    Chu, W.2
  • 13
    • 36949040331 scopus 로고
    • Using conceptual graphs to represent database inference security analysis
    • H. S. Delugach and T. H. Hinke. Using conceptual graphs to represent database inference security analysis. Jour. Computing and Info. Tech., 4(4):291-307, 1994.
    • (1994) Jour. Computing and Info. Tech. , vol.4 , Issue.4 , pp. 291-307
    • Delugach, H.S.1    Hinke, T.H.2
  • 17
    • 84864046807 scopus 로고    scopus 로고
    • Surviving insider attacks: A call for system experiments
    • S. J. Stolfo, S. M. Bellovin, A. D. Keromytis, S. Hershkop, S. W. Smith, and S. Sinclair, editors Springer US
    • V. D. Gligor and C. S. Chandersekaran. Surviving insider attacks: A call for system experiments. In S. J. Stolfo, S. M. Bellovin, A. D. Keromytis, S. Hershkop, S. W. Smith, and S. Sinclair, editors, Insider Attack and Cyber Security, volume 39 of Advances in Information Security, pp. 153-164. Springer US, 2008.
    • (2008) Insider Attack and Cyber Security, Volume 39 of Advances in Information Security , pp. 153-164
    • Gligor, V.D.1    Chandersekaran, C.S.2
  • 21
    • 78549269431 scopus 로고    scopus 로고
    • Risk analysis in access control systems
    • 2010 Eighth Annual International Conference on aug.
    • J. Ma, K. Adi, M. Mejri, and L. Logrippo. Risk analysis in access control systems. In Privacy Security and Trust (PST), 2010 Eighth Annual International Conference on, pp. 160-166, aug. 2010.
    • (2010) Privacy Security and Trust (PST) , pp. 160-166
    • Ma, J.1    Adi, K.2    Mejri, M.3    Logrippo, L.4
  • 25
    • 84864069112 scopus 로고    scopus 로고
    • Oracle. Application access controls governor, 2012. http://www.oracle. com/us/solutions/corporate-governance/access-controls/index.html.
    • (2012) Application Access Controls Governor
  • 26
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • Q. M. S. Osborn, R. Sandhu. Configuring role-based access control to enforce mandatory and discretionary access control policies. In ACM Transaction on Information and System Security, 2000.
    • (2000) ACM Transaction on Information and System Security
    • Osborn, Q.M.S.1    Sandhu, R.2
  • 29
    • 84864046808 scopus 로고    scopus 로고
    • SAP. Access risk management, 2012. www.sap.com/solutions/ sapbusinessobjects/large/governance-risk-compliance/accessandauthorization.
    • (2012) Access Risk Management
  • 31
    • 84864029501 scopus 로고    scopus 로고
    • B. Systems. Identity and access governance, 2012. www.betasystems.com/en/ portfolio/identityaccessgovernance
    • (2012) Identity and Access Governance
  • 32
    • 0031643164 scopus 로고    scopus 로고
    • Data level inference detection in database systems
    • Proc. 11th IEEE
    • R. Yip and E. Levitt. Data level inference detection in database systems. In Computer Security Foundations Workshop, 1998. Proc. 11th IEEE, pp. 179-189, 1998.
    • (1998) Computer Security Foundations Workshop, 1998 , pp. 179-189
    • Yip, R.1    Levitt, E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.