A Graph-Based Approach for Managing Enterprise Information System Security

被引:0
|
作者
Sengupta, Anirban [1 ]
Manna, Asmita [1 ]
Mazumdar, Chandan [2 ]
机构
[1] Jadavpur Univ, Ctr Distributed Comp, Kolkata, India
[2] Jadavpur Univ, Dept Comp Sci & Engn, Kolkata, India
关键词
Access control graph; Enterprise information system graph; Enterprise security modeling; Managerial vulnerability; Security policy;
D O I
10.1109/CUBE.2013.33
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An enterprise information system consists of assets and their inter-relationships. These inter-relationships are manifested in the connection of hardware assets in network architecture, or in the installation of software and information assets in hardware. Security policies are used to specify and control access to enterprise assets. Inter-relationships of assets, along with improper specification of policies, can lead to managerial vulnerabilities in the enterprise information system. Threats may exploit these vulnerabilities to breach the security of sensitive assets. This paper discusses a graph-based methodology for the specification of Enterprise Information Systems. The methodology captures enterprise information security requirements, helps specify security policies, and detects managerial vulnerabilities in enterprise information systems.
引用
收藏
页码:137 / +
页数:3
相关论文
共 50 条
  • [41] A GRAPH-BASED APPROACH FOR SEMISUPERVISED CLUSTERING
    Yoshida, Tetsuya
    COMPUTATIONAL INTELLIGENCE, 2014, 30 (02) : 263 - 284
  • [42] A graph-based approach to inequality assessment
    Palestini, Arsen
    Pignataro, Giuseppe
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2016, 455 : 65 - 78
  • [43] Grid Smoothing: A Graph-Based Approach
    Noel, Guillaume
    Djouani, Karim
    Hamam, Yskandar
    PROGRESS IN PATTERN RECOGNITION, IMAGE ANALYSIS, COMPUTER VISION, AND APPLICATIONS, 2010, 6419 : 153 - 160
  • [44] Graph-based Approach to Reliability Assessment
    Sinitca, Aleksandr M.
    Shalugin, Evgeniy D.
    PROCEEDINGS OF THE 2021 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (ELCONRUS), 2021, : 682 - 685
  • [45] A graph-based approach to auditing RxNorm
    Bodenreider, Olivier
    Peters, Lee B.
    JOURNAL OF BIOMEDICAL INFORMATICS, 2009, 42 (03) : 558 - 570
  • [46] A graph-based approach for POCL planning
    Sebastia, L
    Onaindia, E
    Marzal, E
    ECAI 2000: 14TH EUROPEAN CONFERENCE ON ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2000, 54 : 531 - 535
  • [47] A GRAPH-BASED APPROACH TO CONTEXT MATCHING
    Olaru, Andrei
    Florea, Adina Magda
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2010, 11 (04): : 393 - 399
  • [48] Approach to estimation of level of information security at enterprise based on genetic algorithm
    Stepanov, L., V
    Parinov, A., V
    Korotkikh, L. P.
    Koltsov, A. S.
    INTERNATIONAL CONFERENCE INFORMATION TECHNOLOGIES IN BUSINESS AND INDUSTRY 2018, PTS 1-4, 2018, 1015
  • [49] A KNOWLEDGE GRAPH-BASED DEMENTIA CARE INTELLIGENT RECOMMENDER SYSTEM FOR MANAGING DEMENTIA CARE
    Sun, Yue
    Wang, Zhi-wen
    INNOVATION IN AGING, 2024, 8 : 1104 - 1104
  • [50] Managing information system security.
    Warren, L
    SYSTEMS RESEARCH AND BEHAVIORAL SCIENCE, 1997, 14 (06) : 428 - 429