CASIA OpenIR  > 09年以前成果
Covering based granular computing for conflict analysis
Zhu, William; Wang, Fei-Yue; Mehrotra, S; Zeng, DD; Chen, H; Thuraisingham, B; Wang, FY
AbstractConflicts are widespread in our society owing to the scarcity of physical resources, different cultures and religions. The Chinese Wall security policy is a conflicts model originally proposed by Brewer and Nash for information access control. The rapid development of intelligence and security informatics prompts us to revisit this policy and we use granular computing based on covering rough set theory to study the problems of conflicts of interest in database access security. This new method catches the TAR(in ally with relation) more accurately. It also has potential application to issues in intelligence and security informatics such as information sharing policy and governance.
WOS HeadingsScience & Technology ; Technology
Indexed ByISTP ; SCI
WOS Research AreaComputer Science
WOS SubjectComputer Science, Artificial Intelligence ; Computer Science, Information Systems ; Computer Science, Interdisciplinary Applications ; Computer Science, Theory & Methods
WOS IDWOS:000238207800058
Citation statistics
Cited Times:38[WOS]   [WOS Record]     [Related Records in WOS]
Document Type期刊论文
Affiliation1.Jiangxi Normal Univ, Coll Informat Engn, Nanchang, Peoples R China
2.Univ Auckland, Dept Comp Sci, Auckland 1, New Zealand
3.Chinese Acad Sci, Inst Automat, Key Lab Complex Syst & Intelligent Sci, Beijing 100080, Peoples R China
4.Univ Arizona, SIE Dept, Tucson, AZ 85721 USA
Recommended Citation
GB/T 7714
Zhu, William,Wang, Fei-Yue,Mehrotra, S,et al. Covering based granular computing for conflict analysis[J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS,2006,3975:566-571.
APA Zhu, William.,Wang, Fei-Yue.,Mehrotra, S.,Zeng, DD.,Chen, H.,...&Wang, FY.(2006).Covering based granular computing for conflict analysis.INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS,3975,566-571.
MLA Zhu, William,et al."Covering based granular computing for conflict analysis".INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS 3975(2006):566-571.
Files in This Item:
There are no files associated with this item.
Related Services
Recommend this item
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Zhu, William]'s Articles
[Wang, Fei-Yue]'s Articles
[Mehrotra, S]'s Articles
Baidu academic
Similar articles in Baidu academic
[Zhu, William]'s Articles
[Wang, Fei-Yue]'s Articles
[Mehrotra, S]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Zhu, William]'s Articles
[Wang, Fei-Yue]'s Articles
[Mehrotra, S]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.