• DocumentCode
    2845458
  • Title

    Mitigating Insider Threat without Limiting the Availability in Concurrent Undeclared Tasks

  • Author

    Yaseen, Qussai ; Panda, Brajendra

  • Author_Institution
    Dept. of Comput. Sci. & Comput. Eng., Univ. of Arkansas, Fayetteville, AR, USA
  • fYear
    2012
  • fDate
    20-22 June 2012
  • Firstpage
    235
  • Lastpage
    244
  • Abstract
    Insider threat is a critical problem due to the immense harm that it poses to organizations. This paper investigates this problem in relational database systems. Generally, defending systems against insider threat may require rejecting insiders´ requests to access some data items. The paper focuses on preventing unauthorized knowledge acquisition by insiders in concurrent undeclared tasks, where a task is executed as one operation at a time instead of a batch of operations, without affecting the availability of data items. It proposes approaches to predict the complete operations of undeclared tasks, and then, to organize the operations in a safe sequence that prevents the possible threat of insiders without rejecting any request. Theorems, proofs and simulations are provided to show the effectiveness of the proposed approaches.
  • Keywords
    authorisation; knowledge acquisition; relational databases; concurrent undeclared task; insider threat; knowledge acquisition; relational database system; Availability; Erbium; Organizations; Prediction algorithms; Remuneration; Security; Training; Database; Dependencies; Insider Threat; Security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Software Security and Reliability (SERE), 2012 IEEE Sixth International Conference on
  • Conference_Location
    Gaithersburg, MD
  • Print_ISBN
    978-1-4673-2067-2
  • Type

    conf

  • DOI
    10.1109/SERE.2012.36
  • Filename
    6258313