This paper investigates the problem of insider threat in relational database systems. It defines various types of dependencies as well as constraints on dependencies that may be used by insiders to infer unauthorized information. Furthermore, it introduces the Constraint and Dependency Graph (CDG), and the Dependency Matrix that are used to represent dependencies and constraints on them. Furthermore, it presents an algorithm for constructing insiders knowledge graph, which shows the knowledgebase of insiders. In addition, the paper introduces the Threat Prediction Graph (TPG) to predict and prevent insider threat. © IFIP International Federation for Information Processing 2010.
CITATION STYLE
Yaseen, Q., & Panda, B. (2010). Predicting and preventing insider threat in relational database systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6033 LNCS, pp. 368–383). https://doi.org/10.1007/978-3-642-12368-9_30
Mendeley helps you to discover research relevant for your work.