2012
DOI: 10.1007/978-3-642-31516-9_98
|View full text |Cite
|
Sign up to set email alerts
|

Granular Deleting in Multi Level Security Models – An Electronic Engineering Approach

Abstract: Data protection and information security can be assured by using a multi-level-security (MLS) access control model. However, a workflow between persons with different security levels is complicated by the fact that the exchange of information is only allowed in one direction: from persons that are assigned to a specific security level to person that are assigned to the same security level or to a higher security level (write up). Literature show solution approaches by using a MLS model with increased granulari… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2012
2012
2013
2013

Publication Types

Select...
4
3
1

Relationship

7
1

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 22 publications
0
8
0
Order By: Relevance
“…We use a methodology that consists of five steps. The first step is to identify scenarios by use of scenario technique [8][9][10][11]. A specific scenario is selected considering the occurrence of terrorism attacks and natural disasters in Germany that represents the environment of a logistic system.…”
Section: Methodsmentioning
confidence: 99%
“…We use a methodology that consists of five steps. The first step is to identify scenarios by use of scenario technique [8][9][10][11]. A specific scenario is selected considering the occurrence of terrorism attacks and natural disasters in Germany that represents the environment of a logistic system.…”
Section: Methodsmentioning
confidence: 99%
“…We apply a parameter-selection procedure [14] by constructing several rank-k models [15]. A fivefold crossvalidation [16] is used to measure the approximation to A for each rank-k model and the lowest k is selected where the approximation to A is acceptable as defined by a specific threshold [17]. The k column vectors of U represent the latent semantic textual information in form of a parts-based representation.…”
Section: Methodsmentioning
confidence: 99%
“…Research projects in this area investigate technologies to apply them in a specific security and defence application field (Thorleuchter, Van den Poel, & Prinzie, 2010b). Thus, some of them may be a profitable target for espionage and they have to be protected from information leakage hazard (Thorleuchter & Van den Poel, 2011c;Thorleuchter, Weck, & Van den Poel, 2012a;Thorleuchter, Weck, & Van den Poel, 2012b).…”
Section: Espionage In Applied Science Randtmentioning
confidence: 99%