CASIA OpenIR  > 09年以前成果
Covering based granular computing for conflict analysis
Zhu, William; Wang, Fei-Yue; Mehrotra, S; Zeng, DD; Chen, H; Thuraisingham, B; Wang, FY
2006
发表期刊INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS
卷号3975页码:566-571
文章类型Article
摘要Conflicts are widespread in our society owing to the scarcity of physical resources, different cultures and religions. The Chinese Wall security policy is a conflicts model originally proposed by Brewer and Nash for information access control. The rapid development of intelligence and security informatics prompts us to revisit this policy and we use granular computing based on covering rough set theory to study the problems of conflicts of interest in database access security. This new method catches the TAR(in ally with relation) more accurately. It also has potential application to issues in intelligence and security informatics such as information sharing policy and governance.
WOS标题词Science & Technology ; Technology
关键词[WOS]SECURITY MODEL ; POLICY
收录类别ISTP ; SCI
语种英语
WOS研究方向Computer Science
WOS类目Computer Science, Artificial Intelligence ; Computer Science, Information Systems ; Computer Science, Interdisciplinary Applications ; Computer Science, Theory & Methods
WOS记录号WOS:000238207800058
引用统计
文献类型期刊论文
条目标识符http://ir.ia.ac.cn/handle/173211/9249
专题09年以前成果
作者单位1.Jiangxi Normal Univ, Coll Informat Engn, Nanchang, Peoples R China
2.Univ Auckland, Dept Comp Sci, Auckland 1, New Zealand
3.Chinese Acad Sci, Inst Automat, Key Lab Complex Syst & Intelligent Sci, Beijing 100080, Peoples R China
4.Univ Arizona, SIE Dept, Tucson, AZ 85721 USA
推荐引用方式
GB/T 7714
Zhu, William,Wang, Fei-Yue,Mehrotra, S,et al. Covering based granular computing for conflict analysis[J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS,2006,3975:566-571.
APA Zhu, William.,Wang, Fei-Yue.,Mehrotra, S.,Zeng, DD.,Chen, H.,...&Wang, FY.(2006).Covering based granular computing for conflict analysis.INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS,3975,566-571.
MLA Zhu, William,et al."Covering based granular computing for conflict analysis".INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS 3975(2006):566-571.
条目包含的文件
条目无相关文件。
个性服务
推荐该条目
保存到收藏夹
查看访问统计
导出为Endnote文件
谷歌学术
谷歌学术中相似的文章
[Zhu, William]的文章
[Wang, Fei-Yue]的文章
[Mehrotra, S]的文章
百度学术
百度学术中相似的文章
[Zhu, William]的文章
[Wang, Fei-Yue]的文章
[Mehrotra, S]的文章
必应学术
必应学术中相似的文章
[Zhu, William]的文章
[Wang, Fei-Yue]的文章
[Mehrotra, S]的文章
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。