loading
Papers Papers/2020

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Qutaibah Althebyan and Brajendra Panda

Affiliation: University of Arkansas, United States

ISBN: 978-989-8111-44-9

Abstract: This paper presents a model for insider threat mitigation. While many of the existing insider threat models concentrate on watching insiders’ activities for any misbehavior, we believe that considering the insider himself/herself as a basic entity before looking into his/her activities will be more effective. In this paper, we presented an approach that relies on ontology to extract knowledge from an object. This represents expected knowledge that an insider might gain by accessing that object. We then utilized this information to build a model for insider threat mitigation which ensures that only knowledge units that are related to the insider’s domain of access or his/her assigned tasks will be allowed to be accessed by such insiders.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.236.214.224

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Althebyan, Q. and Panda, B. (2008). Knowledge Extraction and Management for Insider Threat Mitigation. In Proceedings of the 6th International Workshop on Security in Information Systems - WOSIS, (ICEIS 2008) ISBN 978-989-8111-44-9, pages 99-110. DOI: 10.5220/0001741800990110

@conference{wosis08,
author={Qutaibah Althebyan. and Brajendra Panda.},
title={Knowledge Extraction and Management for Insider Threat Mitigation},
booktitle={Proceedings of the 6th International Workshop on Security in Information Systems - WOSIS, (ICEIS 2008)},
year={2008},
pages={99-110},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001741800990110},
isbn={978-989-8111-44-9},
}

TY - CONF

JO - Proceedings of the 6th International Workshop on Security in Information Systems - WOSIS, (ICEIS 2008)
TI - Knowledge Extraction and Management for Insider Threat Mitigation
SN - 978-989-8111-44-9
AU - Althebyan, Q.
AU - Panda, B.
PY - 2008
SP - 99
EP - 110
DO - 10.5220/0001741800990110

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.
0123movie.net