Predicting and preventing insider threat in relational database systems

27Citations
Citations of this article
24Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper investigates the problem of insider threat in relational database systems. It defines various types of dependencies as well as constraints on dependencies that may be used by insiders to infer unauthorized information. Furthermore, it introduces the Constraint and Dependency Graph (CDG), and the Dependency Matrix that are used to represent dependencies and constraints on them. Furthermore, it presents an algorithm for constructing insiders knowledge graph, which shows the knowledgebase of insiders. In addition, the paper introduces the Threat Prediction Graph (TPG) to predict and prevent insider threat. © IFIP International Federation for Information Processing 2010.

Cite

CITATION STYLE

APA

Yaseen, Q., & Panda, B. (2010). Predicting and preventing insider threat in relational database systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6033 LNCS, pp. 368–383). https://doi.org/10.1007/978-3-642-12368-9_30

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free