Sensing insider threat based on access vectors

被引:0
|
作者
Zhang, Hongbin [1 ]
Pei, Qingqi [2 ]
Wang, Chao [2 ]
Wang, Meihua [1 ]
机构
[1] Institute of Information Science and Engineering, Hebei Univ. of Science and Technology, Shijiazhuang 050018, China
[2] State Key Lab. of Integrated Service Networks, Xidian Univ., Xi'an 710071, China
关键词
D O I
10.3969/j.issn.1001-2400.2014.01.020
中图分类号
学科分类号
摘要
引用
收藏
页码:110 / 115
相关论文
共 50 条
  • [1] Algorithm for sensing insider threat based on cloud model
    Zhang, Hong-Bin
    Pei, Qing-Qi
    Ma, Jian-Feng
    Jisuanji Xuebao/Chinese Journal of Computers, 2009, 32 (04): : 784 - 792
  • [2] Detecting Insider Threat Based on Document Access Behavior Analysis
    Zhang, Rui
    Chen, Xiaojun
    Shi, Jinqiao
    Xu, Fei
    Pu, Yiguo
    WEB TECHNOLOGIES AND APPLICATIONS, APWEB 2014, PT II, 2014, 8710 : 376 - 387
  • [3] Mapping Social Media Insider Threat Attack Vectors
    Armstrong, Colin
    PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 1840 - 1848
  • [4] An Access Abstraction Model for Mitigating the Insider Threat
    Jenkins, Jonathan
    ACMSE 2020: PROCEEDINGS OF THE 2020 ACM SOUTHEAST CONFERENCE, 2020, : 320 - 321
  • [5] Memory Access Pattern based Insider Threat Detection in Big Data Systems
    Aditham, Santosh
    Ranganathan, Nagarajan
    Katkoori, Srinivas
    2016 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2016, : 3625 - 3628
  • [6] An ontological approach to the document access problem of insider threat
    Aleman-Meza, B
    Burns, P
    Eavenson, M
    Palaniswami, D
    Sheth, A
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2005, 3495 : 486 - 491
  • [7] Insider Threat Likelihood Assessment for Flexible Access Control
    Boulares, Sofiene
    Adi, Kamel
    Logrippo, Luigi
    E-TECHNOLOGIES: EMBRACING THE INTERNET OF THINGS, MCETECH 2017, 2017, 289 : 77 - 95
  • [8] On the Possibility of Insider Threat Prevention Using Intent-Based Access Control (IBAC)
    Almehmadi, Abdulaziz
    El-Khatib, Khalil
    IEEE SYSTEMS JOURNAL, 2017, 11 (02): : 373 - 384
  • [9] An insider threat aware access control for cloud relational databases
    Qussai Yaseen
    Yaser Jararweh
    Brajendra Panda
    Qutaibah Althebyan
    Cluster Computing, 2017, 20 : 2669 - 2685
  • [10] Preventative directions for insider threat mitigation via access control
    Sinclair, Sara
    Smith, Sean W.
    INSIDER ATTACK AND CYBER SECURITY: BEYOND THE HACKER, 2008, 39 : 165 - 193