Preventing Social Engineering and Espionage in Collaborative Knowledge Management Systems (KMSs)

2011 ◽  
Vol 3 (4) ◽  
pp. 44-51 ◽  
Author(s):  
Oluwafemi S. Ogunseye ◽  
Olusegun Folorunso ◽  
Jeff Zhang

Insider attack and espionage on computer-based information is a major problem for business organizations and governments. Knowledge Management Systems (KMSs) are not exempt from this threat. Prior research presented the Congenial Access Control Model (CAC), a relationship-based access control model, as a better access control method for KMS because it reduces the adverse effect of stringent security measures on the usability of KMSs. However, the CAC model, like other models, e.g., Role Based Access Control (RBAC), Time-Based Access Control (TBAC), and History Based Access Control (HBAC), does not provide adequate protection against privilege abuse by authorized users that can lead to industrial espionage. In this paper, the authors provide an Espionage Prevention Model (EP) that uses Semantic web-based annotations on knowledge assets to store relevant information and compares it to the Friend-Of-A-Friend (FOAF) data of the potential recipient of the resource. It can serve as an additional layer to previous access control models, preferably the Congenial Access Control (CAC) model.

Author(s):  
Oluwafemi S. Ogunseye ◽  
Olusegun Folorunso ◽  
Jeff Zhang

Insider attack and espionage on computer-based information is a major problem for business organizations and governments. Knowledge Management Systems (KMSs) are not exempt from this threat. Prior research presented the Congenial Access Control Model (CAC), a relationship-based access control model, as a better access control method for KMS because it reduces the adverse effect of stringent security measures on the usability of KMSs. However, the CAC model, like other models, e.g., Role Based Access Control (RBAC), Time-Based Access Control (TBAC), and History Based Access Control (HBAC), does not provide adequate protection against privilege abuse by authorized users that can lead to industrial espionage. In this paper, the authors provide an Espionage Prevention Model (EP) that uses Semantic web-based annotations on knowledge assets to store relevant information and compares it to the Friend-Of-A-Friend (FOAF) data of the potential recipient of the resource. It can serve as an additional layer to previous access control models, preferably the Congenial Access Control (CAC) model.


2011 ◽  
Vol 403-408 ◽  
pp. 2477-2480
Author(s):  
Zhen Wu Wang

The normal role-based access control (RBAC) model decouples users and permissions through roles,and different software systems have different implementation syteles.The paper proposes an engine model which can configure the RBAC management systems flexibly.It is a configuration tool to generate different RBAC management systems which meet different users’ requirements. The practice proves that the engine model can improve the efficiency and quality of software development. The role-based access control model decouples users and permissions through roles in order to simplify authorized operations and safety management[1]. Many literatures[2-6] discuss the RBAC model from different aspects. Some literatures[2-3] add new elements to the normal RBAC model,and these models are unidimensional according to the manipulated resources.For example, the NIST RBAC reference model [2] extends and standardize the RBAC96 [1] model reasonably.Some literatures[4-5] introduce time property to RBAC model and they are two-dimensional models according to the manipulated resources.Literature[6] furtherly add visual data muster to RBAC model and proposes a three-dimensional access control model. All of these models only discuss access control model theoretically,and different role-based access control modules in software systems have different instantiation sytles.For example, a RBAC module in one software system can not meet the access control requirements in another system because different RBAC modules have different table fields in order to realize certain requirements. This paper proposes a flexible role-based access control engine which can configure the RBAC module for different systmes according to each customer’s requirement.The engine is a configuration tool and it can realize various RBAC modules which have different table fields in database.The paper is organized as follows.Section I introduces the basic concepts of the NIST RBAC model;Seciton II details the description of RBAC engine model and gives the configuration steps using this engine to generate RBAC instances,and at last section III gives an example and concludes the paper.


2021 ◽  
Vol 4 (9(112)) ◽  
pp. 6-14
Author(s):  
Sameera Sadey Shijer ◽  
Ahmad H. Sabry

The developments of wireless networks have directed to search for opportunities of a broad diversity of improved and new networking contributions. Wireless Asynchronous Transfer Mode (ATM) is a non-synchronous or random mode of transferring information. The advantages of circuit switching include dedicated connections and guaranteed traffic parameters and the benefits of packet switching are the efficiency at the physical layer and a more cost-effective design. ATM is the only protocol that offers the best of both communication methods. Although the Variable Bit-Rate (VBR) transmission presents a promising prospective of stable data quality, it is usually accompanied by network traffic overload and cell packet loss, which extensively weakens that potential. This work overcomes these concerns by developing a switching-based multiple access control model to improve the data transmission performance of wireless ATM. Therefore, this work discusses the effectiveness of the developed approach to minimize the cell packet losses and network traffic overload in wireless ATM. Three control access is processed; polling, token passing, and reservation algorithms for collision avoidance. The reservation stage reserves the data before sending, which includes two timeline intervals; a fixed-time reservation period, and variable data transmission interval. Using OPNET 10.5, the results show that the presented switching-based multiple access control model can achieve a throughput value of 98.3 %, data transmission delay of about 40.2 ms, and 0.024 % of packet losses during data transmission between the source and destination. It is demonstrated that the introduced method effectively transmits information without creating any network complexity and delay


Author(s):  
Yi Zhao ◽  
Wolfgang A. Halang

With the increasing development of the Semantic Web technologies, the Semantic Web has been introduced to apply in the Web Services to integrate data across different applications. For the Semantic Web Services to succeed it is essential to maintain the security of the organizations involved. Security is a crucial concern for commercial and mission critical applications in Web-based environments. To guarantee the security of the Web Services, security measures must be considered to protect against unauthorized disclosure, transfer, modification, or destruction, whether accidental or intentional. Access control is a kind of security measurements to guarantee the service processes, which is defined to allow resource owners to define, manage, and enforce the access conditions for each resource. In this chapter, an attribute based access control model with semantic mapping (SABAC, for short) is proposed to specify access control over attributes defined in domain ontologies. The model is built on the basis of XACML policy language. Semantic mapping process is proved to be syntactical, semantic, and structural. Our SABAC model between the service requester and service provider can make the access to the Semantic Web Services secure.


MIS Quarterly ◽  
2013 ◽  
Vol 37 (1) ◽  
pp. 299-313 ◽  
Author(s):  
Yinglei Wang ◽  
◽  
Darren B. Meister ◽  
Peter H. Gray ◽  
◽  
...  

2009 ◽  
Vol 28 (12) ◽  
pp. 3214-3216
Author(s):  
Yi DING ◽  
Yong FANG ◽  
An-min ZHOU ◽  
Jiao ZENG ◽  
Yu FAN

Sign in / Sign up

Export Citation Format

Share Document