Access control requirements for preventing insider threats

被引:0
|
作者
Park, Joon S. [1 ]
Giordano, Joseph
机构
[1] Syracuse Univ, Syracuse, NY 13244 USA
[2] USAF, Res Lab, AFRL, Informat Directorate, Rome, NY 13441 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Today the Intelligence Community (IC) has faced increasing challenges of insider threats. It is generally accepted that, the cost of insider threats exceeds that of outsider threats. Although the currently available access control approaches have a great potential for preventing insider threats, there are still critical obstacles to be solved, especially in large-scale computing environments. In this paper we discuss those requirements with respect to scalability, granularity, and context-awareness. For each requirement we discussed related problems, techniques, and basic approaches to the corresponding countermeasures. Detailed solutions and implementations are not described in this paper.
引用
收藏
页码:529 / 534
页数:6
相关论文
共 50 条
  • [21] Tracking the Insider Attacker: A Blockchain Traceability System for Insider Threats
    Hu, Teng
    Xin, Bangzhou
    Liu, Xiaolei
    Chen, Ting
    Ding, Kangyi
    Zhang, Xiaosong
    SENSORS, 2020, 20 (18) : 1 - 18
  • [22] Preventing and countering insider threats and radicalism in an Indonesian research reactor: Development of a human reliability program (HRP)
    Wisnubroto, Djarot Sulistio
    Khairul, Khairul
    Basuki, Fatmuanis
    Kristuti, Endang
    HELIYON, 2023, 9 (05)
  • [23] Insider Threat Likelihood Assessment for Flexible Access Control
    Boulares, Sofiene
    Adi, Kamel
    Logrippo, Luigi
    E-TECHNOLOGIES: EMBRACING THE INTERNET OF THINGS, MCETECH 2017, 2017, 289 : 77 - 95
  • [24] The influence of insider law on preventing insider information leakage
    Li, Guangshuai
    Bi, Ying
    Metallurgical and Mining Industry, 2015, 7 (09): : 446 - 451
  • [25] Towards a New Taxonomy of Insider Threats
    Chaipa, Sarathiel
    Ketcha Ngassam, Ernest
    Shawren, Singh
    2022 IST-AFRICA CONFERENCE, 2022,
  • [26] Insider Threats to IT Security of Critical Infrastructures
    Gaidarski, Ivan
    Minchev, Zlatogor
    Studies in Big Data, 2021, 84 : 381 - 394
  • [27] Insider Threats: It's the HUMAN, Stupid!
    Greitzer, Frank L.
    NCS'19: PROCEEDINGS OF THE NORTHWEST CYBERSECURITY SYMPOSIUM, 2019,
  • [28] Semantic analysis for monitoring insider threats
    Symonenko, S
    Liddy, ED
    Yilmazel, O
    Del Zoppo, R
    Brown, E
    Downey, M
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2004, 3073 : 492 - 500
  • [29] Mitigating Inadvertent Insider Threats with Incentives
    Liu, Debin
    Wang, XiaoFeng
    Camp, L. Jean
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2009, 5628 : 1 - 16
  • [30] Detecting Insider Threats: Solutions and Trends
    Zeadally, Sherali
    Yu, Byunggu
    Jeong, Dong Hyun
    Liang, Lily
    INFORMATION SECURITY JOURNAL, 2012, 21 (04): : 183 - 192