Chapter

Intelligence and Security Informatics

Volume 3975 of the series Lecture Notes in Computer Science pp 566-571

Covering Based Granular Computing for Conflict Analysis

  • William ZhuAffiliated withCollege of Information Engineering, Jiangxi Normal UniversityDepartment of Computer Sciences, The University of AucklandThe Key Laboratory of Complex Systems and Intelligent Science, Institute of Automation, The Chinese Academy of Sciences
  • , Fei-Yue WangAffiliated withThe Key Laboratory of Complex Systems and Intelligent Science, Institute of Automation, The Chinese Academy of SciencesSIE Department, The University of Arizona

* Final gross prices may vary according to local VAT.

Get Access

Abstract

Conflicts are widespread in our society owing to the scarcity of physical resources, different cultures and religions. The Chinese Wall security policy is a conflicts model originally proposed by Brewer and Nash for information access control. The rapid development of intelligence and security informatics prompts us to revisit this policy and we use granular computing based on covering rough set theory to study the problems of conflicts of interest in database access security. This new method catches the IAR(in ally with relation) more accurately. It also has potential application to issues in intelligence and security informatics such as information sharing policy and governance.