DocumentCode
2018303
Title
Extending trust in enterprise systems
Author
Mondai, Shatabdi ; Setua, S.K.
Author_Institution
Asansol Eng. Coll., Burdwan, India
fYear
2015
fDate
7-8 Feb. 2015
Firstpage
1
Lastpage
6
Abstract
Modern enterprises are facing more and more uncertainties and challenges from insecurity and context sensitivity. In view of information security, an enterprise is considered as a collection of assets and their interrelationships and how users use their rights to access the enterprise. These interrelationships may be built into the enterprise information infrastructure, as in the case of connection of hardware elements in network architecture, or in the installation of software or in the information assets. As a result, access to one element may enable access to another if they are connected. An enterprise may specify the conditions on how to access certain assets in certain mode (read, write etc.) as policies. The interconnection of assets, along with specified policies, may lead to vulnerabilities in the enterprise information system if misused. This paper presents a formal methodology for detection of vulnerabilities and threats to enterprise information systems.
Keywords
enterprise resource planning; information systems; security of data; enterprise information infrastructure; enterprise information system; information security; Additives; Authorization; Availability; Databases; Information systems; Permission; Enterprise information security; Policies; Security parameters; Vulnerability;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer, Communication, Control and Information Technology (C3IT), 2015 Third International Conference on
Conference_Location
Hooghly
Print_ISBN
978-1-4799-4446-0
Type
conf
DOI
10.1109/C3IT.2015.7060169
Filename
7060169
Link To Document