메뉴 건너뛰기




Volumn 39, Issue PART B, 2013, Pages 237-254

An adaptive risk management and access control framework to mitigate insider threats

Author keywords

Access control; Inference threat; Insider threat; Risk management; Role based access control; Trust

Indexed keywords

ADAPTIVE RISK MANAGEMENT; ASSESSMENT PROCESS; EXPERIMENTAL EVALUATION; INFERENCE THREAT; INSIDER THREAT; ROLE-BASED ACCESS CONTROL; ROLE-BASED ACCESS CONTROL MODEL; TRUST;

EID: 84888864547     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2013.08.001     Document Type: Article
Times cited : (57)

References (38)
  • 4
    • 33747817026 scopus 로고    scopus 로고
    • Reconfiguring Role Based Access Control policies using risk semantics
    • B. Aziz, S.N. Foley, J. Herbert, and G. Swart Reconfiguring role based access control policies using risk semantics Journal of High Speed Networks: Special Issue on Managing Security Policies, Modelling Verification and Configuration 15 3 2006 261 273 (Pubitemid 44285876)
    • (2006) Journal of High Speed Networks , vol.15 , Issue.3 , pp. 261-273
    • Aziz, B.1    Foley, S.N.2    Herbert, J.3    Swart, G.4
  • 6
    • 84883108231 scopus 로고    scopus 로고
    • Beyond accountability: Using obligations to reduce risk exposure and deter insider attacks
    • Amsterdam The Netherlands 10.1145/2462410.2462411
    • N. Baracaldo, and J. Joshi Beyond accountability: using obligations to reduce risk exposure and deter insider attacks ACM symposium on access control models and technologies (SACMAT) 2013 Amsterdam The Netherlands 213 224 10.1145/2462410.2462411 http://doi.acm.org/10.1145/2462410.2462411
    • (2013) ACM Symposium on Access Control Models and Technologies (SACMAT) , pp. 213-224
    • Baracaldo, N.1    Joshi, J.2
  • 10
    • 0034314077 scopus 로고    scopus 로고
    • Secure databases: Constraints, inference channels, and monitoring disclosures
    • DOI 10.1109/69.895801
    • A. Brodsky, C. Farkas, and S. Jajodia Secure databases: constraints, inference channels, and monitoring disclosures Knowledge and Data Engineering, IEEE Transactions on 12 6 2000 900 919 10.1109/69.895801 (Pubitemid 32130742)
    • (2000) IEEE Transactions on Knowledge and Data Engineering , vol.12 , Issue.6 , pp. 900-919
    • Brodsky, A.1    Farkas, C.2    Jajodia, S.3
  • 13
    • 33748081445 scopus 로고    scopus 로고
    • TrustBAC - Integrating trust relationships into the RBAC model for access control in open systems
    • SACMAT 2006: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies
    • S. Chakraborty, and I. Ray Trustbac: integrating trust relationships into the RBAC model for access control in open systems Proceedings of the eleventh ACM symposium on access control models and technologies, SACMAT'06 2006 ACM New York, NY, USA 49 58 10.1145/1133058.1133067 http://doi.acm.org/10.1145/1133058. 1133067 (Pubitemid 44300741)
    • (2006) Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT , vol.2006 , pp. 49-58
    • Chakraborty, S.1    Ray, I.2
  • 14
    • 46649105922 scopus 로고    scopus 로고
    • Protection of database security via collaborative inference detection
    • 10.1109/TKDE.2007.190642
    • Y. Chen, and W. Chu Protection of database security via collaborative inference detection Knowledge and Data Engineering, IEEE Transactions on 20 8 2008 1013 1027 10.1109/TKDE.2007.190642
    • (2008) Knowledge and Data Engineering, IEEE Transactions on , vol.20 , Issue.8 , pp. 1013-1027
    • Chen, Y.1    Chu, W.2
  • 17
    • 84888856937 scopus 로고    scopus 로고
    • CPN CPN tools 2013 http://cpntools.org/
    • (2013) CPN Tools
  • 18
    • 36949040331 scopus 로고
    • Using conceptual graphs to represent database inference security analysis
    • H.S. Delugach, and T.H. Hinke Using conceptual graphs to represent database inference security analysis Journal of Computing and Information Technology 4 4 1994 291 307 http://www.cs.uah.edu/delugach/publications.html
    • (1994) Journal of Computing and Information Technology , vol.4 , Issue.4 , pp. 291-307
    • Delugach, H.S.1    Hinke, T.H.2
  • 22
    • 84864046807 scopus 로고    scopus 로고
    • Surviving insider attacks: A call for system experiments
    • S.J. Stolfo, S.M. Bellovin, A.D. Keromytis, S. Hershkop, S.W. Smith, S. Sinclair, Advances in information security Springer US 10.1007/978-0-387-77322- 3-9
    • V.D. Gligor, and C.S. Chandersekaran Surviving insider attacks: a call for system experiments S.J. Stolfo, S.M. Bellovin, A.D. Keromytis, S. Hershkop, S.W. Smith, S. Sinclair, Insider attack and Cyber security Advances in information security vol. 39 2008 Springer US 153 164 10.1007/978-0-387-77322-3- 9 http://dx.doi.org/10.1007/978-0-387-77322-3-9
    • (2008) Insider Attack and Cyber Security , vol.39 , pp. 153-164
    • Gligor, V.D.1    Chandersekaran, C.S.2
  • 24
    • 0343144868 scopus 로고
    • Coloured petri nets
    • W. Brauer, W. Reisig, G. Rozenberg, Lecture notes in computer science Springer Berlin Heidelberg 10.1007/BFb0046842
    • K. Jensen Coloured petri nets W. Brauer, W. Reisig, G. Rozenberg, Petri nets: central models and their properties Lecture notes in computer science vol. 254 1987 Springer Berlin Heidelberg 248 299 10.1007/BFb0046842 http://dx.doi.org/10.1007/BFb0046842
    • (1987) Petri Nets: Central Models and Their Properties , vol.254 , pp. 248-299
    • Jensen, K.1
  • 29
    • 84864069112 scopus 로고    scopus 로고
    • Oracle Application access controls governor 2012 http://www.oracle.com/ us/solutions/corporate-governance/access-controls/index.html
    • (2012) Application Access Controls Governor
  • 30
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • Q.M.S. Osborn, and R. Sandhu Configuring role-based access control to enforce mandatory and discretionary access control policies ACM Transaction on information and system security 2000
    • (2000) ACM Transaction on Information and System Security
    • Osborn, Q.M.S.1    Sandhu, R.2
  • 33
    • 84864046808 scopus 로고    scopus 로고
    • SAP Access risk management 2012 http://www.sap.com/solutions/ sapbusinessobjects/large/governance-risk-compliance/accessandauthorization/ index.epx
    • (2012) Access Risk Management


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.