Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices

  • Samarati P
  • Tunstall M
  • Posegga J
  • et al.
N/ACitations
Citations of this article
26Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper investigates the problem of insider threat in relational database systems. It defines various types of dependencies as well as constraints on dependencies that may be used by insiders to infer unauthorized information. Furthermore, it introduces the Constraint and Dependency Graph (CDG), and the Dependency Matrix that are used to represent dependencies and constraints on them. Furthermore, it presents an algorithm for constructing insiders knowledge graph, which shows the knowledgebase of insiders. In addition, the paper introduces the Threat Prediction Graph (TPG) to predict and prevent insider threat.

Cite

CITATION STYLE

APA

Samarati, P., Tunstall, M., Posegga, J., Markantonakis, K., & Sauveron, D. (2010). Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices. (P. Samarati, M. Tunstall, J. Posegga, K. Markantonakis, & D. Sauveron, Eds.), 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings (Vol. 6033, p. 386). Passau, Germany: Springer. https://doi.org/10.1007/978-3-642-12368-9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free