Advertisement

Covering Based Granular Computing for Conflict Analysis

  • William Zhu
  • Fei-Yue Wang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3975)

Abstract

Conflicts are widespread in our society owing to the scarcity of physical resources, different cultures and religions. The Chinese Wall security policy is a conflicts model originally proposed by Brewer and Nash for information access control. The rapid development of intelligence and security informatics prompts us to revisit this policy and we use granular computing based on covering rough set theory to study the problems of conflicts of interest in database access security. This new method catches the IAR(in ally with relation) more accurately. It also has potential application to issues in intelligence and security informatics such as information sharing policy and governance.

Keywords

Granular Computing Inside Threat Security Informatics Discretionary Access Control Interest Cluster 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Pawlak, Z.: On conflicts. International Journal of Man-Machine Studies 21, 127–134 (1984)MATHCrossRefGoogle Scholar
  2. 2.
    Pawlak, Z.: Analysis of conflicts. In: Joint Conference of Information Science, pp. 350–352 (1997)Google Scholar
  3. 3.
    Pawlak, Z.: An inquiry into anatomy of conflicts. Journal of Information Sciences 109, 65–78 (1998)CrossRefMathSciNetGoogle Scholar
  4. 4.
    Pawlak, Z.: Some remarks on conflict analysis. European Journal of Operational Research 166, 649–654 (2005)MATHCrossRefGoogle Scholar
  5. 5.
    Xia, Z., Jiang, Y., Zhong, Y., Zhang, S.: A novel policy and information flow security model for active network. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds.) ISI 2004. LNCS, vol. 3073, pp. 42–55. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  6. 6.
    Hughes, E., Kazura, A., Rosenthal, A.: Policy-based information sharing with semantics. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds.) ISI 2004. LNCS, vol. 3073, pp. 508–509. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  7. 7.
    Radlauer, D.: Incident and casualty databases as a tool for understanding low-intensity conflicts. In: Kantor, P., Muresan, G., Roberts, F., Zeng, D.D., Wang, F.-Y., Chen, H., Merkle, R.C. (eds.) ISI 2005. LNCS, vol. 3495, pp. 153–170. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  8. 8.
    Aleman-Meza, B., Burns, P., Eavenson, M., Palaniswami, D., Sheth, A.P.: An ontological approach to the document access problem of insider threat. In: Kantor, P., Muresan, G., Roberts, F., Zeng, D.D., Wang, F.-Y., Chen, H., Merkle, R.C. (eds.) ISI 2005. LNCS, vol. 3495, pp. 486–491. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  9. 9.
    Bobeica, M., Jéral, J.-P., Garcia, T., Best, C.: A study of “Root causes of conflict” using latent semantic analysis. In: Kantor, P., Muresan, G., Roberts, F., Zeng, D.D., Wang, F.-Y., Chen, H., Merkle, R.C. (eds.) ISI 2005. LNCS, vol. 3495, pp. 595–596. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  10. 10.
    Lin, T.Y.: Chinese walls security policy - an aggresive model. In: Proc. 5th Annual International Computer Software and Applications Conference, pp. 282–289 (1989)Google Scholar
  11. 11.
    Lin, T.Y.: Chinese walls security model and conflict analysis. In: Proc. 24th Annual International Computer Software and Applications Conference, pp. 122–127 (2000)Google Scholar
  12. 12.
    Lin, T.Y.: Granular computing on binary relations-analysis of conflict and chinese wall security policy. In: Alpigini, J.J., Peters, J.F., Skowron, A., Zhong, N. (eds.) RSCTC 2002. LNCS (LNAI), vol. 2475, pp. 296–299. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  13. 13.
    Lin, T.Y.: Placing the chinese walls on the boundary of conflicts. In: Proc. 26th Annual International Computer Software and Applications Conference, pp. 966–971 (2002)Google Scholar
  14. 14.
    Lin, T.Y.: Granular computing - structures, representations, and applications. In: Wang, G., Liu, Q., Yao, Y., Skowron, A. (eds.) RSFDGrC 2003. LNCS (LNAI), vol. 2639, pp. 16–24. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  15. 15.
    Brewer, D., Nash, M.: The chinese wall security policy. In: IEEE Symposium on Security and Privacy, pp. 206–214 (1989)Google Scholar
  16. 16.
    Zhu, F.: On covering generalized rough sets. Master’s thesis, The Universite of Arizona, Tucson, Arizona, USA (2002)Google Scholar
  17. 17.
    Zhu, W., Wang, F.Y.: Reduction and axiomization of covering generalized rough sets. Information Sciences 152, 217–230 (2003)MATHCrossRefMathSciNetGoogle Scholar
  18. 18.
    Zhu, W., Wang, F.Y.: Relationships among three types of covering rough sets. In: IEEE GrC (2006) (to appear)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • William Zhu
    • 1
    • 2
    • 3
  • Fei-Yue Wang
    • 3
    • 4
  1. 1.College of Information EngineeringJiangxi Normal UniversityNanchangChina
  2. 2.Department of Computer SciencesThe University of AucklandNew Zealand
  3. 3.The Key Laboratory of Complex Systems and Intelligent Science, Institute of AutomationThe Chinese Academy of SciencesBeijingChina
  4. 4.SIE DepartmentThe University of ArizonaTucsonUSA

Personalised recommendations