메뉴 건너뛰기




Volumn , Issue , 2013, Pages 213-224

Beyond accountability: Using obligations to reduce risk exposure and deter insider attacks

Author keywords

Access control; Insider threat; Obligations; RBAC; Risk; Trust

Indexed keywords

FINANCIAL LOSS; HEALTH CARE INFORMATION SYSTEM; INSIDER THREAT; MISCONFIGURATIONS; OBLIGATIONS; PRIVILEGE MANAGEMENT; RBAC; TRUST;

EID: 84883108231     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2462410.2462411     Document Type: Conference Paper
Times cited : (8)

References (30)
  • 4
    • 56749093226 scopus 로고    scopus 로고
    • Insider threat detection using situation-aware mas
    • 2008 11th International Conf. on
    • J. Buford, L. Lewis, and G. Jakobson. Insider threat detection using situation-aware mas. In Information Fusion, 2008 11th International Conf. on, pp. 1-8, 2008.
    • (2008) Information Fusion , pp. 1-8
    • Buford, J.1    Lewis, L.2    Jakobson, G.3
  • 6
    • 84857844113 scopus 로고    scopus 로고
    • A survey on trust management for mobile ad hoc networks
    • IEEE
    • J.-H. Cho, A. Swami, and I.-R. Chen. A survey on trust management for mobile ad hoc networks. Communications Surveys Tutorials, IEEE, 13(4):562-583, 2011.
    • (2011) Communications Surveys Tutorials , vol.13 , Issue.4 , pp. 562-583
    • Cho, J.-H.1    Swami, A.2    Chen, I.-R.3
  • 13
    • 44149127452 scopus 로고    scopus 로고
    • Assigning responsibility for failed obligations
    • K. Irwin, T. Yu, and W. Winsborough. Assigning responsibility for failed obligations. In Trust Management II, pp. 327-342, 2008.
    • (2008) Trust Management II , pp. 327-342
    • Irwin, K.1    Yu, T.2    Winsborough, W.3
  • 24
    • 84861100364 scopus 로고    scopus 로고
    • Dynamic risk-based decision methods for access control systems
    • R. Shaikh, K. Adi, and L. Logrippo. Dynamic risk-based decision methods for access control systems. Computers and Security, 31(4):447-464, 2012.
    • (2012) Computers and Security , vol.31 , Issue.4 , pp. 447-464
    • Shaikh, R.1    Adi, K.2    Logrippo, L.3
  • 26
    • 33646831908 scopus 로고    scopus 로고
    • Trustguard: Countering vulnerabilities in reputation management for decentralized overlay networks
    • WWW '05
    • M. Srivatsa, L. Xiong, and L. Liu. Trustguard: countering vulnerabilities in reputation management for decentralized overlay networks. In Proc. of the 14th international conf. on World Wide Web, WWW '05, pp. 422-431, 2005.
    • (2005) Proc. of the 14th International Conf. on World Wide Web , pp. 422-431
    • Srivatsa, M.1    Xiong, L.2    Liu, L.3
  • 28
    • 57349156959 scopus 로고    scopus 로고
    • Uaq: A framework for user authorization query processing in rbac extended with hybrid hierarchy and constraints
    • SACMAT '08
    • Y. Zhang and J. B. D. Joshi. Uaq: a framework for user authorization query processing in rbac extended with hybrid hierarchy and constraints. In Proc. of the 13th ACM SACMAT, SACMAT '08, pp. 83-92, 2008.
    • (2008) Proc. of the 13th ACM SACMAT , pp. 83-92
    • Zhang, Y.1    Joshi, J.B.D.2
  • 30
    • 84887367019 scopus 로고    scopus 로고
    • Criterion functions for document clustering experiments and analysis
    • Y. Zhao and G. Karypis. Criterion functions for document clustering experiments and analysis. Mach. Learn., 55(3), 2002.
    • (2002) Mach. Learn. , vol.55 , Issue.3
    • Zhao, Y.1    Karypis, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.