WEKO3
アイテム
Provenance-Based Security Risk Assessment Framework
https://ipsj.ixsq.nii.ac.jp/records/103109
https://ipsj.ixsq.nii.ac.jp/records/103109971b2463-684f-4e3f-a266-625b86164eb8
| 名前 / ファイル | ライセンス | アクション |
|---|---|---|
|
|
Copyright (c) 2014 by the Information Processing Society of Japan
|
|
| オープンアクセス | ||
| Item type | Journal(1) | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|
| 公開日 | 2014-09-15 | |||||||||
| タイトル | ||||||||||
| タイトル | Provenance-Based Security Risk Assessment Framework | |||||||||
| タイトル | ||||||||||
| 言語 | en | |||||||||
| タイトル | Provenance-Based Security Risk Assessment Framework | |||||||||
| 言語 | ||||||||||
| 言語 | eng | |||||||||
| キーワード | ||||||||||
| 主題Scheme | Other | |||||||||
| 主題 | [特集:新しいリスクに対応するコンピュータセキュリティ技術] risk assessment, provenance, big data, OPM | |||||||||
| 資源タイプ | ||||||||||
| 資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||||||
| 資源タイプ | journal article | |||||||||
| 著者所属 | ||||||||||
| Universal Communication Research Institute, National Institute of Information and Communications Technology (NICT) | ||||||||||
| 著者所属 | ||||||||||
| Universal Communication Research Institute, National Institute of Information and Communications Technology (NICT) | ||||||||||
| 著者所属(英) | ||||||||||
| en | ||||||||||
| Universal Communication Research Institute, National Institute of Information and Communications Technology (NICT) | ||||||||||
| 著者所属(英) | ||||||||||
| en | ||||||||||
| Universal Communication Research Institute, National Institute of Information and Communications Technology (NICT) | ||||||||||
| 著者名 |
GuillermoHoracioRamirezCaceres
× GuillermoHoracioRamirezCaceres
× Koji, Zettsu
|
|||||||||
| 著者名(英) |
Guillermo, HoracioRamirezCaceres
× Guillermo, HoracioRamirezCaceres
× Koji, Zettsu
|
|||||||||
| 論文抄録 | ||||||||||
| 内容記述タイプ | Other | |||||||||
| 内容記述 | Large-scale massive heterogeneous data have been accumulated in various fields of scientific research and society. As a result, discovering new knowledge by linking sensing and science data, such as web archives, has attracted attention. We developed a Knowledge Language Grid (KLG) system that combines multiple asset data from different providers and allows users to use or re-use them. KLG structures a great quantity of information that can be confidential for individuals, companies, or institutions, but it can also be misused or disclosed to inappropriate people. In this paper, we propose a risk assessment framework based on provenance information. In addition, since KLG allows user to access security knowledge-bases, it is possible to provide actual and on time information about risk and security controls. Our proposed system implements a graphic representation of provenance using Open Provenance Model (OPM), and users are allowed to see graphically where and what kinds of data generate security conflicts. ------------------------------ This is a preprint of an article intended for publication Journal of Information Processing(JIP). This preprint should not be cited. This article should be cited as: Journal of Information Processing Vol.22(2014) No.4 (online) DOI http://dx.doi.org/10.2197/ipsjjip.22.617 ------------------------------ |
|||||||||
| 論文抄録(英) | ||||||||||
| 内容記述タイプ | Other | |||||||||
| 内容記述 | Large-scale massive heterogeneous data have been accumulated in various fields of scientific research and society. As a result, discovering new knowledge by linking sensing and science data, such as web archives, has attracted attention. We developed a Knowledge Language Grid (KLG) system that combines multiple asset data from different providers and allows users to use or re-use them. KLG structures a great quantity of information that can be confidential for individuals, companies, or institutions, but it can also be misused or disclosed to inappropriate people. In this paper, we propose a risk assessment framework based on provenance information. In addition, since KLG allows user to access security knowledge-bases, it is possible to provide actual and on time information about risk and security controls. Our proposed system implements a graphic representation of provenance using Open Provenance Model (OPM), and users are allowed to see graphically where and what kinds of data generate security conflicts. ------------------------------ This is a preprint of an article intended for publication Journal of Information Processing(JIP). This preprint should not be cited. This article should be cited as: Journal of Information Processing Vol.22(2014) No.4 (online) DOI http://dx.doi.org/10.2197/ipsjjip.22.617 ------------------------------ |
|||||||||
| 書誌レコードID | ||||||||||
| 収録物識別子タイプ | NCID | |||||||||
| 収録物識別子 | AN00116647 | |||||||||
| 書誌情報 |
情報処理学会論文誌 巻 55, 号 9, 発行日 2014-09-15 |
|||||||||
| ISSN | ||||||||||
| 収録物識別子タイプ | ISSN | |||||||||
| 収録物識別子 | 1882-7764 | |||||||||