Access control requirements for preventing insider threats

被引:0
|
作者
Park, Joon S. [1 ]
Giordano, Joseph
机构
[1] Syracuse Univ, Syracuse, NY 13244 USA
[2] USAF, Res Lab, AFRL, Informat Directorate, Rome, NY 13441 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Today the Intelligence Community (IC) has faced increasing challenges of insider threats. It is generally accepted that, the cost of insider threats exceeds that of outsider threats. Although the currently available access control approaches have a great potential for preventing insider threats, there are still critical obstacles to be solved, especially in large-scale computing environments. In this paper we discuss those requirements with respect to scalability, granularity, and context-awareness. For each requirement we discussed related problems, techniques, and basic approaches to the corresponding countermeasures. Detailed solutions and implementations are not described in this paper.
引用
收藏
页码:529 / 534
页数:6
相关论文
共 50 条
  • [31] Federated Platooning: Insider Threats and Mitigations
    Callegati, Franco
    Gabbrielli, Maurizio
    Giallorenzo, Saverio
    Melis, Andrea
    Prandini, Marco
    PROCEEDINGS OF THE 52ND ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2019, : 3222 - 3231
  • [32] Introduction to the Special Issue on Insider Threats
    Claycomb, Bill
    Greitzer, Frank
    Jaros, Stephanie L.
    Gardner, Carrie
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2022, 3 (01):
  • [33] Model Based Analysis of Insider Threats
    Chen, Taolue
    Han, Tingting
    Kammueller, Florian
    Nemli, Ibrahim
    Probst, Christian W.
    2016 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2016,
  • [34] Preventing Insider Attacks in the Cloud
    Sundararajan, Sudharsan
    Narayanan, Hari
    Pavithran, Vipin
    Vorungati, Kaladhar
    Achuthan, Krishnashree
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT I, 2011, 190 : 488 - +
  • [35] Preventative directions for insider threat mitigation via access control
    Sinclair, Sara
    Smith, Sean W.
    INSIDER ATTACK AND CYBER SECURITY: BEYOND THE HACKER, 2008, 39 : 165 - 193
  • [36] An insider threat aware access control for cloud relational databases
    Qussai Yaseen
    Yaser Jararweh
    Brajendra Panda
    Qutaibah Althebyan
    Cluster Computing, 2017, 20 : 2669 - 2685
  • [37] An insider threat aware access control for cloud relational databases
    Yaseen, Qussai
    Jararweh, Yaser
    Panda, Brajendra
    Althebyan, Qutaibah
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (03): : 2669 - 2685
  • [38] ACCESS CONTROL REQUIREMENTS FOR PRIVACY AND SECURITY
    KINGSLAKE, R
    INFORMATION PRIVACY, 1979, 1 (07): : 312 - 314
  • [39] Mitigating Insider Threats on the Edge: A Knowledgebase Approach
    Althebyan, Qutaibah
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2020, 17 (4A) : 621 - 628
  • [40] Positioning Your Organization to Respond to Insider Threats
    Greitzer F.L.
    Purl J.
    Leong Y.M.
    Sticha P.J.
    IEEE Engineering Management Review, 1600, 47 (02): : 75 - 83