Assignment of security clearances in an organization

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The paper discusses the assignment of security clearances to employees in a security conscious organization. New approaches are suggested for solving two major problems. First, full implementation of the 'need-to-know' principle is provided by the introduction of Data Access Statements (DAS) as part of employee's job description. Second, for the problem of setting up border points between different security clearances, the paper introduces a fuzzy set model. This model helps to solve this problem, effectively connecting it with the cost of security. Finally, a method is presented for calculating security values of objects security clearances for employees when the information objects are connected to each other in a network structure. Copyright © 2005 by International Federation for Information Processing.

Cite

CITATION STYLE

APA

Janczewski, L. J., & Portougal, V. (2005). Assignment of security clearances in an organization. In IFIP Advances in Information and Communication Technology (Vol. 181, pp. 51–63). https://doi.org/10.1007/0-387-25660-1_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free