2013
DOI: 10.1155/2013/569562
|View full text |Cite
|
Sign up to set email alerts
|

Enterprise Information Security Management Based on Context-Aware RBAC and Communication Monitoring Technology

Abstract: Information technology has an enormous influence in many enterprises. Computers have not only become important devices that people rely on in their daily lives and work, but have also become essential tools for enterprises. More and more enterprises have shifted their focus to how to prevent outer forces from invading and stealing from networks. However, many enterprises have disregarded the significance of internal leaking, which also plays a vital role in information management. This research proposes an inf… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…First, there are various emergency situations in medical environments, and it is crucial to respond to such situations promptly [ 10 ]. Therefore, the situation must be taken into consideration when deciding access permissions, and access decisions should change, depending on the severity of the situation [ 11 ]. Second, MISs store sensitive data, such as personal information and medical records, and information leakages in this field are likely to result in egregious violations of patient confidentiality.…”
Section: Introductionmentioning
confidence: 99%
“…First, there are various emergency situations in medical environments, and it is crucial to respond to such situations promptly [ 10 ]. Therefore, the situation must be taken into consideration when deciding access permissions, and access decisions should change, depending on the severity of the situation [ 11 ]. Second, MISs store sensitive data, such as personal information and medical records, and information leakages in this field are likely to result in egregious violations of patient confidentiality.…”
Section: Introductionmentioning
confidence: 99%
“…Monitoring can be achieved through logging, observing, and recording a person's behaviour. New information equipments are available to help security personnel and system administrators enforce and monitor information security policies (Mei-Yu & Ming-Hsien, 2013). The devices are technical methods that can provide backup, logging, blocking and monitory functions.…”
Section: Operations Security Access Control and Monitoring And Reviewsmentioning
confidence: 99%
“…The devices are technical methods that can provide backup, logging, blocking and monitory functions. Communication monitoring technologies can filter, record, or block suspected activities in order to reduce the occurrence of security incidence (Mei-Yu & Ming-Hsien, 2013). Logging of data is important for monitoring and forensics purposes and should include network traffic monitoring.…”
Section: Operations Security Access Control and Monitoring And Reviewsmentioning
confidence: 99%