
consideration the subsequent effects of the correlated 
anomalies, in addition to the direct impact caused by 
the  same  anomalies  on  the  whole  database  access 
control  system.  For  that  reason,  our  system  is 
designed  to  be  as  global  and  comprehensive  as 
possible.  
At the present stage of our work, we have already 
furnished in a recent publication, the description of 
the  proposed  framework  for  the  overall  risk 
management system for our approach. The paper that 
presents  in  details  the  correlation  management 
subsystem is also under process.  
In  a  close  future,  we  intend  to  concretely  and 
practically evaluate the correlated risk and the overall 
risk with real case studies with real database. 
REFERENCES 
Sandhu, R., Coynek, E. J., Feinsteink, H. L., and Youmank, 
C. E., 1996. Role-Based Access Control Models, IEEE 
Computer, vol. 29, no. 2, (pp. 38-47) 
International  Electrotechnical  Commission,  International 
Standard, ISO/IEC 27000:2014, 
International  Electrotechnical  Commission,  International 
Standard, ISO/IEC 31010:2009, First Edition, 2009. 
Cheng, P.-C., Rohatgi, P., Keser, C., Karger, P.A., Wagner, 
G.M.,  Reninger,  A.S.,  2007.  Fuzzy  MLS:  An 
Experiment  on  Quantified  Risk–Adaptive  Access 
Control, In Security and Privacy, (pp.222–230). 
Bertino, E., Ghinita, G., Kamra, A., 2011. “Access Control 
for Databases: Concepts and Systems” Foundations and 
Trends in Databases Vol. 3, http://dx.doi.org/10.1561/ 
1900000014. 
Khambhammettu, H., Boulares, B., Adi, A., Logrippo, L., 
2012.    “A  framework  for  threat  assessment  in  access 
control systems” that appeared in Proceedings of 27th 
IFIP  TC  11  Information  Security  and  Privacy 
Conference.  http://dx.doi.org/10.1007/978-3-642-
30436-1_16 
Diep, N. N., Hung, L. X., Zhung, Y., Lee, S., Lee, Y. K., 
Lee, H., 2007. “Enforcing Access Control Using Risk 
Assessment”,  Proceedings  of  the  Fourth  European 
Conference  on  Universal  Multiservice  Networks 
(ECUMN'07).  http://dx.doi.org/10.1109/ECUMN. 
2007.19 
Colantonio,  A.,  Di  Pietro,  R.,  Ocello,  A.,  Verde,  N.V., 
2010. “Evaluating the Risk of Adopting RBAC Roles”, 
ara  Foresti;  Sushil  Jajodia.  Data  and  Applications 
Security  and  Privacy  XXIV,  6166,  Springer. 
http://dx.doi.org/10.1016/j.dss.2010.08.022 
Burnett,  C.,  Chen,  L.,  Edwards,  P.,  Norman,  T.  J., 
“TRAAC:  Trust  and  Risk  Aware  Access  Control”, 
2014.  Twelfth  Annual  International  Conference  on 
Privacy, Security and Trust (PST). http://dx.doi.org/10. 
1109/PST.2014.6890962. 
Ma, J., Adi, K., Mejri, M., Logrippo, L., 2010. Risk analysis 
in  access  control  systems.  In  Eighth  Annual 
International Conference on Privacy Security and Trust 
(PST), pp. 160-166 
Baracaldo,  N.,  Joshi,  J.,  2013.  “An  adaptive  risk 
management and access control framework to mitigate 
insider  threats”,  Computers  &  Security.  http://dx.doi. 
org/10.1016/j.cose.2013.08.001. 
Celikel, E., Kantarcioglu, M., Thuraisingham; D., Bertino, 
E., 2009. A risk management approach to RBAC”. Risk 
and  Decision  Analysis  1  (2009)  21–33.  DOI 
10.3233/RDA-2008-0002. IOS Press 
Costante, E., Vavilis, S., Etalle, S., Petkovic M., Zannone, 
N.,  2013.  Database  Anomalous  Activities:  Detection 
and Quantification, SECRYPT 2013: 603-608. 
Grushka-Cohen,  H.,  Sofer,  O.,  Biller,  O.,  Shapira,  B., 
Rokach,  L.,  2016.  CyberRank-Knowledge  Elicitation 
for Risk Assessment of Database Security, 2016 ACM. 
DOI: http://dx.doi.org/10.1145/ 2983323.2983896. 
Darwish, S. M., 2015. Machine learning approach to detect 
intruders in database based on hexplet data structure. 
Journal  of  Electrical  Systems  and  Information 
Technology  3  (2016)  261–269  http://dx.doi.org/10. 
1016/j.jesit.2015.12.001. 
DCENASE 2018 - Doctoral Consortium on Evaluation of Novel Approaches to Software Engineering
22