Affiliation:
1. University of Agriculture, Nigeria
2. Ball State University, USA
Abstract
Insider attack and espionage on computer-based information is a major problem for business organizations and governments. Knowledge Management Systems (KMSs) are not exempt from this threat. Prior research presented the Congenial Access Control Model (CAC), a relationship-based access control model, as a better access control method for KMS because it reduces the adverse effect of stringent security measures on the usability of KMSs. However, the CAC model, like other models, e.g., Role Based Access Control (RBAC), Time-Based Access Control (TBAC), and History Based Access Control (HBAC), does not provide adequate protection against privilege abuse by authorized users that can lead to industrial espionage. In this paper, the authors provide an Espionage Prevention Model (EP) that uses Semantic web-based annotations on knowledge assets to store relevant information and compares it to the Friend-Of-A-Friend (FOAF) data of the potential recipient of the resource. It can serve as an additional layer to previous access control models, preferably the Congenial Access Control (CAC) model.
Subject
Computer Networks and Communications,Information Systems
Reference22 articles.
1. Firm Resources and Sustained Competitive Advantage
2. The Semantic Web
3. Covington, M., Moyer, M., & Ahmad, M. (2008). Generalized role based access control for securing future applications (Tech. Rep. GIT-CC-00-02). Atlanta, GA: Georgia Institute of Technology.
4. Delphi Group. (1994). The document process. Retrieved from http://www.delphigroup.com/research/whitepapers/DocIsProcess.pdf
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献