Predicting and Preventing Insider Threat in Relational Database Systems

被引:0
|
作者
Yaseen, Qussai [1 ]
Panda, Brajendra [1 ]
机构
[1] Univ Arkansas, Dept Comp Sci & Comp Engn, Fayetteville, AR 72701 USA
关键词
Relational Database; Security; Insider Threat; Dependencies;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper investigates the problem of insider threat in relational database systems. It defines various types of dependencies as well as constraints on dependencies that may be used by insiders to infer unauthorized information. Furthermore, it introduces the Constraint and Dependency Graph (CDG), and the Dependency Matrix that are used to represent dependencies and constraints on them. Furthermore, it presents an algorithm for constructing insiders knowledge graph, which shows the knowledgebase of insiders. In addition, the paper introduces the Threat Prediction Graph (TPG) to predict and prevent insider threat.
引用
收藏
页码:368 / 383
页数:16
相关论文
共 50 条
  • [31] RELATIONAL DATABASE-SYSTEMS FOR MICROS
    BOWERMAN, R
    DATAMATION, 1983, 29 (07): : 128 - &
  • [32] Distributed Benchmarking of Relational Database Systems
    de Lima, Murilo R.
    Sunye, Marcos S.
    de Almeida, Eduardo C.
    Direne, Alexandre I.
    ADVANCES IN DATA AND WEB MANAGEMENT, PROCEEDINGS, 2009, 5446 : 544 - +
  • [33] Querying ontologies in relational database systems
    Trissl, S
    Leser, U
    DATA INTEGRATION IN THE LIFE SCIENCES, PROCEEDINGS, 2005, 3615 : 63 - 79
  • [34] Similarity Joins in Relational Database Systems
    Augsten, Nikolaus
    Böhlen, Michael H.
    Synthesis Lectures on Data Management, 2014, 5 (05): : 1 - 106
  • [35] Integrating XML and relational database systems
    Kappel, G
    Kapsammer, E
    Retschitzegger, W
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2004, 7 (04): : 343 - 384
  • [36] An object relational database for hypermedia systems
    Ghaleb, Fayed F.M.
    Saad, Amani A.
    Sheta, Osama E.
    AEJ Alexandria Eng J, 1600, 3 (355-372):
  • [37] The Insider Threat in Scalable Distributed Systems: Algorithms, Metrics and Gaps
    Amir, Yair
    STC'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON SCALABLE TRUSTED COMPUTING, 2007, : 49 - 49
  • [38] Cryptography and relational database management systems
    He, JM
    Wang, M
    2001 INTERNATIONAL DATABASE ENGINEERING & APPLICATIONS SYMPOSIUM, PROCEEDINGS, 2001, : 273 - 284
  • [39] Audio support in relational database systems
    Ramos, AMM
    Yamakami, A
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VII, PROCEEDINGS: INFORMATION SYSTEMS DEVELOPMENT II, 2002, : 142 - 153
  • [40] Behavioral and policy issues in information systems security: the insider threat
    Warkentin, Merrill
    Willison, Robert
    EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2009, 18 (02) : 101 - 105