DocumentCode :
2018303
Title :
Extending trust in enterprise systems
Author :
Mondai, Shatabdi ; Setua, S.K.
Author_Institution :
Asansol Eng. Coll., Burdwan, India
fYear :
2015
fDate :
7-8 Feb. 2015
Firstpage :
1
Lastpage :
6
Abstract :
Modern enterprises are facing more and more uncertainties and challenges from insecurity and context sensitivity. In view of information security, an enterprise is considered as a collection of assets and their interrelationships and how users use their rights to access the enterprise. These interrelationships may be built into the enterprise information infrastructure, as in the case of connection of hardware elements in network architecture, or in the installation of software or in the information assets. As a result, access to one element may enable access to another if they are connected. An enterprise may specify the conditions on how to access certain assets in certain mode (read, write etc.) as policies. The interconnection of assets, along with specified policies, may lead to vulnerabilities in the enterprise information system if misused. This paper presents a formal methodology for detection of vulnerabilities and threats to enterprise information systems.
Keywords :
enterprise resource planning; information systems; security of data; enterprise information infrastructure; enterprise information system; information security; Additives; Authorization; Availability; Databases; Information systems; Permission; Enterprise information security; Policies; Security parameters; Vulnerability;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer, Communication, Control and Information Technology (C3IT), 2015 Third International Conference on
Conference_Location :
Hooghly
Print_ISBN :
978-1-4799-4446-0
Type :
conf
DOI :
10.1109/C3IT.2015.7060169
Filename :
7060169
Link To Document :
بازگشت