Covering based granular computing for conflict analysis | |
Zhu, William; Wang, Fei-Yue; Mehrotra, S; Zeng, DD; Chen, H; Thuraisingham, B; Wang, FY | |
刊名 | INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS |
2006 | |
卷号 | 3975页码:566-571 |
英文摘要 | Conflicts are widespread in our society owing to the scarcity of physical resources, different cultures and religions. The Chinese Wall security policy is a conflicts model originally proposed by Brewer and Nash for information access control. The rapid development of intelligence and security informatics prompts us to revisit this policy and we use granular computing based on covering rough set theory to study the problems of conflicts of interest in database access security. This new method catches the TAR(in ally with relation) more accurately. It also has potential application to issues in intelligence and security informatics such as information sharing policy and governance. |
WOS标题词 | Science & Technology ; Technology |
类目[WOS] | Computer Science, Artificial Intelligence ; Computer Science, Information Systems ; Computer Science, Interdisciplinary Applications ; Computer Science, Theory & Methods |
研究领域[WOS] | Computer Science |
关键词[WOS] | SECURITY MODEL ; POLICY |
收录类别 | ISTP ; SCI |
语种 | 英语 |
WOS记录号 | WOS:000238207800058 |
公开日期 | 2015-12-24 |
内容类型 | 期刊论文 |
源URL | [http://ir.ia.ac.cn/handle/173211/9249] |
专题 | 自动化研究所_09年以前成果 |
作者单位 | 1.Jiangxi Normal Univ, Coll Informat Engn, Nanchang, Peoples R China 2.Univ Auckland, Dept Comp Sci, Auckland 1, New Zealand 3.Chinese Acad Sci, Inst Automat, Key Lab Complex Syst & Intelligent Sci, Beijing 100080, Peoples R China 4.Univ Arizona, SIE Dept, Tucson, AZ 85721 USA |
推荐引用方式 GB/T 7714 | Zhu, William,Wang, Fei-Yue,Mehrotra, S,et al. Covering based granular computing for conflict analysis[J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS,2006,3975:566-571. |
APA | Zhu, William.,Wang, Fei-Yue.,Mehrotra, S.,Zeng, DD.,Chen, H.,...&Wang, FY.(2006).Covering based granular computing for conflict analysis.INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS,3975,566-571. |
MLA | Zhu, William,et al."Covering based granular computing for conflict analysis".INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS 3975(2006):566-571. |
个性服务 |
查看访问统计 |
相关权益政策 |
暂无数据 |
收藏/分享 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论