A POLICY-DRIVEN FRAMEWORK FOR DOCUMENT CLASSIFICATION AND ENTERPRISE SECURITY

被引:0
|
作者
Nwafor, Ebelechukwu [1 ]
Chowdhary, Pawan [2 ]
Chandra, Anca [2 ]
机构
[1] Howard Univ, Dept Comp Sci, Washington, DC 20059 USA
[2] IBM Corp, Almaden Res Ctr, Cloud Storage & Mobile Analyt, 650 Harry Rd, San Jose, CA 95120 USA
关键词
Pervasive computing; Data classification; Context-aware security; Enterprise data security;
D O I
10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.110
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In an enterprise, accessing data on the go using several ubiquitous devices is fast becoming the norm. This brings its own set of challenges when dealing with access to sensitive resources. The pervasive nature of these devices makes them ideal candidates for cyber-attacks. The challenge arises in ensuring that devices conform to proper access control requirements. Due to the nature of the cyber-attacks on ubiquitous devices, there is a need to provide dynamic access control to enterprise resources. A system that automatically classifies documents by sensitivity level would be essential to every enterprise. This helps reduce manual document classification that might be prone to errors. To this effect, we propose a framework that automates the security profile detection and access pattern of enterprise resources using text mining, user context and enterprise policies. We also develop a prototype system to elevate the effectiveness of our framework.
引用
收藏
页码:949 / 953
页数:5
相关论文
共 50 条
  • [1] Policy-driven model for security management
    Boudaoud, K
    McCathieNevile, C
    NETWORK CONTROL AND ENGINEERING FOR QOS, SECURITY AND MOBILITY, 2003, 107 : 419 - 424
  • [2] SPECSA: a scalable, policy-driven, extensible, and customizable security architecture for wireless enterprise applications
    Itani, W
    Kayssi, AI
    CONFERENCE PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2004, : 753 - 759
  • [3] Specsa: A scalable, policy-driven, extensible, and customizable security architecture for wireless enterprise applications
    Itani, Wassim
    Kayssi, Ayman
    Comput Commun, 1600, 18 SPEC. ISS. (1825-1839):
  • [4] SPECSA: a scalable, policy-driven, extensible, and custornizable security architecture for wireless enterprise applications
    Itani, W
    Kayssi, A
    COMPUTER COMMUNICATIONS, 2004, 27 (18) : 1825 - 1839
  • [5] Policy-Driven Security Management for Fog Computing: Preliminary Framework and A Case Study
    Dsouza, Clinton
    Ahn, Gail-Joon
    Taguinod, Marthony
    2014 IEEE 15TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), 2014, : 16 - 23
  • [6] Fidelis: A policy-driven trust management framework
    Yao, WTM
    TRUST MANAGEMENT, PROCEEDINGS, 2003, 2692 : 301 - 317
  • [7] A policy-driven RFID event management framework
    Hyungjin Ahn
    Kwanghoon Kim
    Telecommunication Systems, 2014, 55 : 5 - 15
  • [8] A Policy-driven RFID Event Management Framework
    Ahn, Hyungjin
    Song, Jihye
    Kim, Kwanghoon
    Park, Joosang
    Hwang, Jaekag
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION TECHNOLOGIES & APPLICATIONS (ICUT 2009), 2009, : 76 - 81
  • [9] A policy-driven RFID event management framework
    Ahn, Hyungjin
    Kim, Kwanghoon
    TELECOMMUNICATION SYSTEMS, 2014, 55 (01) : 5 - 15
  • [10] Towards a Policy-driven Framework for Managing Service Dependability
    Bernal Bernabe, Jorge
    Marin Perez, Juan M.
    Martinez Manzano, Daniel J.
    Gil Perez, Manuel
    Gomez Skarmeta, Antonio F.
    DEPEND: 2009 SECOND INTERNATIONAL CONFERENCE ON DEPENDABILITY, 2009, : 66 - 72