Sciweavers

Share
ISI
2004
Springer

Composite Role-Based Monitoring (CRBM) for Countering Insider Threats

9 years 3 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC). Intelligence management has faced increasing complexities of delegation and granular protection as more corporate entities have worked together in a dynamic collaborative environment. We have been confronted by the issue of how to share and simultaneously guard information assets from one another. Although many existing security approaches help to counter insiders’ unlawful behavior, it is still found at a preliminary level. Efficiently limiting internal resources to privileged insiders remains a challenge today. In this paper we introduce the CRBM (Composite Role-Based Monitoring) approach by extending the current role-based access control (RBAC) model to overcome its limitations in countering insider threats. CRBM not only inherits the RBAC’s advantages, such as scalable administration, least privile...
Joon S. Park, Shuyuan Mary Ho
Added 02 Jul 2010
Updated 02 Jul 2010
Type Conference
Year 2004
Where ISI
Authors Joon S. Park, Shuyuan Mary Ho
Comments (0)
books