Secure knowledge management: Confidentiality, trust, and privacy

被引:69
作者
Bertino, Elisa [1 ]
Khan, Latifur R.
Sandhu, Ravi
Thuraisingham, Bhavani
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[2] Univ Texas, Richardson, TX 75083 USA
[3] George Mason Univ, Dept Ind & Syst Engn, Fairfax, VA 22030 USA
来源
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS | 2006年 / 36卷 / 03期
关键词
data mining; privacy; role-based access control (RBAC); secure knowledge management; security policy; semantic web; trust negotiation (TN); usage control (UCON);
D O I
10.1109/TSMCA.2006.871796
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Knowledge management enhances the value of a corporation by identifying the assets and expertise as well as efficiently managing the resources. Security for knowledge management is critical as organizations have to protect their intellectual assets. Therefore, only authorized individuals must be permitted to execute various operations and functions in an organization. In this paper, secure knowledge management will be discussed, focusing on confidentiality, trust, and privacy. In particular, certain access-control techniques will be investigated, and trust management as well as privacy control for knowledge management will be explored.
引用
收藏
页码:429 / 438
页数:10
相关论文
共 25 条
  • [1] A model for attribute-based user-role assignment
    Al-Kahtani, MA
    Sandhu, R
    [J]. 18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 353 - 362
  • [2] [Anonymous], 2005, DATABASE APPL SECURI
  • [3] Selective and authentic third-party distribution of XML documents
    Bertino, E
    Carminati, B
    Ferrari, E
    Thuraisingham, B
    Gupta, A
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2004, 16 (10) : 1263 - 1278
  • [4] Trust negotiations: Concepts, systems, and languages
    Bertino, E
    Ferrari, E
    Squicciarini, AC
    [J]. COMPUTING IN SCIENCE & ENGINEERING, 2004, 6 (04) : 27 - 34
  • [5] Trust-X:: A peer-to-peer framework for trust establishment
    Bertino, E
    Ferrari, E
    Squicciarini, AC
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2004, 16 (07) : 827 - 842
  • [6] Decentralized trust management
    Blaze, M
    Feigenbaum, J
    Lacy, J
    [J]. 1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, : 164 - 173
  • [7] Carminati B., 2004, P DEXA WORKSH WEB SE, P472
  • [8] Denker G., 2003, P 2 INT SEM WEB C IS, P335
  • [9] Ferraiolo D. F., 2001, ACM Transactions on Information and Systems Security, V4, P224, DOI 10.1145/501978.501980
  • [10] Finin T, 2002, SIGMOD REC, V31, P30, DOI 10.1145/637411.637416