Covering Based Granular Computing for Conflict Analysis

  • William Zhu
  • Fei-Yue Wang
Conference paper

DOI: 10.1007/11760146_58

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3975)
Cite this paper as:
Zhu W., Wang FY. (2006) Covering Based Granular Computing for Conflict Analysis. In: Mehrotra S., Zeng D.D., Chen H., Thuraisingham B., Wang FY. (eds) Intelligence and Security Informatics. ISI 2006. Lecture Notes in Computer Science, vol 3975. Springer, Berlin, Heidelberg


Conflicts are widespread in our society owing to the scarcity of physical resources, different cultures and religions. The Chinese Wall security policy is a conflicts model originally proposed by Brewer and Nash for information access control. The rapid development of intelligence and security informatics prompts us to revisit this policy and we use granular computing based on covering rough set theory to study the problems of conflicts of interest in database access security. This new method catches the IAR(in ally with relation) more accurately. It also has potential application to issues in intelligence and security informatics such as information sharing policy and governance.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • William Zhu
    • 1
    • 2
    • 3
  • Fei-Yue Wang
    • 3
    • 4
  1. 1.College of Information EngineeringJiangxi Normal UniversityNanchangChina
  2. 2.Department of Computer SciencesThe University of AucklandNew Zealand
  3. 3.The Key Laboratory of Complex Systems and Intelligent Science, Institute of AutomationThe Chinese Academy of SciencesBeijingChina
  4. 4.SIE DepartmentThe University of ArizonaTucsonUSA

Personalised recommendations