Covering Based Granular Computing for Conflict Analysis
- Cite this paper as:
- Zhu W., Wang FY. (2006) Covering Based Granular Computing for Conflict Analysis. In: Mehrotra S., Zeng D.D., Chen H., Thuraisingham B., Wang FY. (eds) Intelligence and Security Informatics. ISI 2006. Lecture Notes in Computer Science, vol 3975. Springer, Berlin, Heidelberg
Conflicts are widespread in our society owing to the scarcity of physical resources, different cultures and religions. The Chinese Wall security policy is a conflicts model originally proposed by Brewer and Nash for information access control. The rapid development of intelligence and security informatics prompts us to revisit this policy and we use granular computing based on covering rough set theory to study the problems of conflicts of interest in database access security. This new method catches the IAR(in ally with relation) more accurately. It also has potential application to issues in intelligence and security informatics such as information sharing policy and governance.
Unable to display preview. Download preview PDF.