[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/HICSS.2009.104guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Case Studies of an Insider Framework

Published: 05 January 2009 Publication History

Abstract

Much of the literature on insider threat assumes, explicitly or implicitly, a binary, perimeter-based notion of an insider. However, it is generally accepted that this notion is unrealistic. The Attribute-Based Group Access Control (ABGAC) framework is a generalization of Role-Based Access Control (RBAC) which allows us to define a non-binary notion of "insiderness". In this paper, we illustrate how to use ABGAC to perform insider threat analysis of high-risk resources with three case studies. This precise yet flexible identification of high-risk resources and associated insiders allows organizations to understand where to target efforts towards defending against the insider problem.

Cited By

View all
  • (2021)Insiders Dissected: New Foundations and a Systematisation of the Research on InsidersDigital Threats: Research and Practice10.1145/34736743:1(1-35)Online publication date: 22-Oct-2021
  • (2019)Insight Into Insiders and ITACM Computing Surveys10.1145/330377152:2(1-40)Online publication date: 2-Apr-2019
  • (2016)Classification of Insider Threat Detection TechniquesProceedings of the 11th Annual Cyber and Information Security Research Conference10.1145/2897795.2897799(1-4)Online publication date: 5-Apr-2016
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
HICSS '09: Proceedings of the 42nd Hawaii International Conference on System Sciences
January 2009
4812 pages
ISBN:9780769534503

Publisher

IEEE Computer Society

United States

Publication History

Published: 05 January 2009

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 21 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2021)Insiders Dissected: New Foundations and a Systematisation of the Research on InsidersDigital Threats: Research and Practice10.1145/34736743:1(1-35)Online publication date: 22-Oct-2021
  • (2019)Insight Into Insiders and ITACM Computing Surveys10.1145/330377152:2(1-40)Online publication date: 2-Apr-2019
  • (2016)Classification of Insider Threat Detection TechniquesProceedings of the 11th Annual Cyber and Information Security Research Conference10.1145/2897795.2897799(1-4)Online publication date: 5-Apr-2016
  • (2009)E-voting and forensicsProceedings of the 2009 conference on Electronic voting technology/workshop on trustworthy elections10.5555/1855491.1855494(3-3)Online publication date: 10-Aug-2009
  • (2009)The epistemology of computer securityACM SIGSOFT Software Engineering Notes10.1145/1640162.165527434:6(8-10)Online publication date: 3-Dec-2009

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media