Access control requirements for preventing insider threats

被引:0
|
作者
Park, Joon S. [1 ]
Giordano, Joseph
机构
[1] Syracuse Univ, Syracuse, NY 13244 USA
[2] USAF, Res Lab, AFRL, Informat Directorate, Rome, NY 13441 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Today the Intelligence Community (IC) has faced increasing challenges of insider threats. It is generally accepted that, the cost of insider threats exceeds that of outsider threats. Although the currently available access control approaches have a great potential for preventing insider threats, there are still critical obstacles to be solved, especially in large-scale computing environments. In this paper we discuss those requirements with respect to scalability, granularity, and context-awareness. For each requirement we discussed related problems, techniques, and basic approaches to the corresponding countermeasures. Detailed solutions and implementations are not described in this paper.
引用
收藏
页码:529 / 534
页数:6
相关论文
共 50 条
  • [41] Rising to the Challenge of Insider Threats for Middle Powers
    Modini, Jessemyn
    Van Zomeren, Mark
    Fowler, Stuart
    Joiner, Keith
    Lynar, Tim
    PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2020), 2020, : 521 - 529
  • [42] Towards Formal Analysis of Insider Threats for Auctions
    Kammuller, Florian
    Kerber, Manfred
    Probst, Christian W.
    MIST'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS, 2016, : 23 - 34
  • [43] Predict insider threats using human behaviors
    Mills J.U.
    Stuban S.M.F.
    Dever J.
    IEEE Engineering Management Review, 2017, 45 (01): : 39 - 48
  • [44] Understanding and countering insider threats in software development
    Franz, Michael
    2008 INTERNATIONAL MCETECH CONFERENCE ON E-TECHNOLOGIES, PROCEEDINGS, 2007, : 81 - 90
  • [45] Assessment of ESD threats to electronic components and ESD control requirements
    Smallwood, J
    Paasi, J
    ELECTROSTATICS 2003, 2004, (178): : 247 - 252
  • [46] Mining for Insider Threats in Business Transactions and Processes
    Eberle, William
    Holder, Lawrence
    2009 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING, 2009, : 163 - 170
  • [47] The Dark Triad and Insider Threats in Cyber Security
    Maasberg, Michele
    Van Slyke, Craig
    Ellis, Selwyn
    Beebe, Nicole
    COMMUNICATIONS OF THE ACM, 2020, 63 (12) : 64 - 70
  • [48] A Multidimension Taxonomy of Insider Threats in Cloud Computing
    Alhanahnah, Mohannad J.
    Jhumka, Arshad
    Alouneh, Sahel
    COMPUTER JOURNAL, 2016, 59 (11): : 1612 - 1622
  • [49] Detecting Insider Threats Through Language Change
    Taylor, Paul J.
    Dando, Coral J.
    Ormerod, Thomas C.
    Ball, Linden J.
    Jenkins, Marisa C.
    Sandham, Alexandra
    Menacere, Tarek
    LAW AND HUMAN BEHAVIOR, 2013, 37 (04) : 267 - 275
  • [50] A Data-Driven Evaluation for Insider Threats
    Sun, Yuqing
    Xu, Haoran
    Bertino, Elisa
    Sun, Chao
    DATA SCIENCE AND ENGINEERING, 2016, 1 (02) : 73 - 85