Skip to main content

Covering Based Granular Computing for Conflict Analysis

  • Conference paper
Intelligence and Security Informatics (ISI 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3975))

Included in the following conference series:

Abstract

Conflicts are widespread in our society owing to the scarcity of physical resources, different cultures and religions. The Chinese Wall security policy is a conflicts model originally proposed by Brewer and Nash for information access control. The rapid development of intelligence and security informatics prompts us to revisit this policy and we use granular computing based on covering rough set theory to study the problems of conflicts of interest in database access security. This new method catches the IAR(in ally with relation) more accurately. It also has potential application to issues in intelligence and security informatics such as information sharing policy and governance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Pawlak, Z.: On conflicts. International Journal of Man-Machine Studies 21, 127–134 (1984)

    Article  MATH  Google Scholar 

  2. Pawlak, Z.: Analysis of conflicts. In: Joint Conference of Information Science, pp. 350–352 (1997)

    Google Scholar 

  3. Pawlak, Z.: An inquiry into anatomy of conflicts. Journal of Information Sciences 109, 65–78 (1998)

    Article  MathSciNet  Google Scholar 

  4. Pawlak, Z.: Some remarks on conflict analysis. European Journal of Operational Research 166, 649–654 (2005)

    Article  MATH  Google Scholar 

  5. Xia, Z., Jiang, Y., Zhong, Y., Zhang, S.: A novel policy and information flow security model for active network. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds.) ISI 2004. LNCS, vol. 3073, pp. 42–55. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  6. Hughes, E., Kazura, A., Rosenthal, A.: Policy-based information sharing with semantics. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds.) ISI 2004. LNCS, vol. 3073, pp. 508–509. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  7. Radlauer, D.: Incident and casualty databases as a tool for understanding low-intensity conflicts. In: Kantor, P., Muresan, G., Roberts, F., Zeng, D.D., Wang, F.-Y., Chen, H., Merkle, R.C. (eds.) ISI 2005. LNCS, vol. 3495, pp. 153–170. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  8. Aleman-Meza, B., Burns, P., Eavenson, M., Palaniswami, D., Sheth, A.P.: An ontological approach to the document access problem of insider threat. In: Kantor, P., Muresan, G., Roberts, F., Zeng, D.D., Wang, F.-Y., Chen, H., Merkle, R.C. (eds.) ISI 2005. LNCS, vol. 3495, pp. 486–491. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  9. Bobeica, M., Jéral, J.-P., Garcia, T., Best, C.: A study of “Root causes of conflict” using latent semantic analysis. In: Kantor, P., Muresan, G., Roberts, F., Zeng, D.D., Wang, F.-Y., Chen, H., Merkle, R.C. (eds.) ISI 2005. LNCS, vol. 3495, pp. 595–596. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  10. Lin, T.Y.: Chinese walls security policy - an aggresive model. In: Proc. 5th Annual International Computer Software and Applications Conference, pp. 282–289 (1989)

    Google Scholar 

  11. Lin, T.Y.: Chinese walls security model and conflict analysis. In: Proc. 24th Annual International Computer Software and Applications Conference, pp. 122–127 (2000)

    Google Scholar 

  12. Lin, T.Y.: Granular computing on binary relations-analysis of conflict and chinese wall security policy. In: Alpigini, J.J., Peters, J.F., Skowron, A., Zhong, N. (eds.) RSCTC 2002. LNCS (LNAI), vol. 2475, pp. 296–299. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  13. Lin, T.Y.: Placing the chinese walls on the boundary of conflicts. In: Proc. 26th Annual International Computer Software and Applications Conference, pp. 966–971 (2002)

    Google Scholar 

  14. Lin, T.Y.: Granular computing - structures, representations, and applications. In: Wang, G., Liu, Q., Yao, Y., Skowron, A. (eds.) RSFDGrC 2003. LNCS (LNAI), vol. 2639, pp. 16–24. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  15. Brewer, D., Nash, M.: The chinese wall security policy. In: IEEE Symposium on Security and Privacy, pp. 206–214 (1989)

    Google Scholar 

  16. Zhu, F.: On covering generalized rough sets. Master’s thesis, The Universite of Arizona, Tucson, Arizona, USA (2002)

    Google Scholar 

  17. Zhu, W., Wang, F.Y.: Reduction and axiomization of covering generalized rough sets. Information Sciences 152, 217–230 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  18. Zhu, W., Wang, F.Y.: Relationships among three types of covering rough sets. In: IEEE GrC (2006) (to appear)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhu, W., Wang, FY. (2006). Covering Based Granular Computing for Conflict Analysis. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, FY. (eds) Intelligence and Security Informatics. ISI 2006. Lecture Notes in Computer Science, vol 3975. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11760146_58

Download citation

  • DOI: https://doi.org/10.1007/11760146_58

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34478-0

  • Online ISBN: 978-3-540-34479-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics