Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics最新文献

筛选
英文 中文
Empirical analysis on causal relationship between institution and economic development based on VAR method 基于VAR方法的制度与经济发展因果关系实证分析
Yu Jinyu, He Zhi-xing
{"title":"Empirical analysis on causal relationship between institution and economic development based on VAR method","authors":"Yu Jinyu, He Zhi-xing","doi":"10.1109/ISI.2011.5984103","DOIUrl":"https://doi.org/10.1109/ISI.2011.5984103","url":null,"abstract":"Economic development level has important effect on the institution. And economic development is an adjustment process of stock variable. Thus, it is difficult to achieve desired results for the institution transplanting. Under different conditions and during different period, the relationship between the institution and economic development is different. A theoretical model on causal relationship between institution and economic development was established, based on VAR (vector auto-regression) method, and the relationship was affirmed.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126085568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Sensitivity-Based Access Control 基于动态灵敏度的访问控制
Amir Harel, A. Shabtai, L. Rokach, Y. Elovici
{"title":"Dynamic Sensitivity-Based Access Control","authors":"Amir Harel, A. Shabtai, L. Rokach, Y. Elovici","doi":"10.1109/ISI.2011.5984080","DOIUrl":"https://doi.org/10.1109/ISI.2011.5984080","url":null,"abstract":"In this paper we propose a new access control mechanism, Dynamic Sensitivity-Based Access Control (DSBAC), designed to regulate users' access to sensitive data stored in relational databases. The DSBAC is an extension of the basic mandatory access control (MAC) mechanism, and it uses the M-score (Misuseability score) measure in order to assign, dynamically, an access class to each set of tuples.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132453808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Identification of related information of interest across free text documents 识别自由文本文档中感兴趣的相关信息
James R. Johnson, Anita Miller, L. Khan, B. Thuraisingham, Murat Kantarcioglu
{"title":"Identification of related information of interest across free text documents","authors":"James R. Johnson, Anita Miller, L. Khan, B. Thuraisingham, Murat Kantarcioglu","doi":"10.1109/ISI.2011.5984058","DOIUrl":"https://doi.org/10.1109/ISI.2011.5984058","url":null,"abstract":"An approach is presented for finding information of interest in a free text document and then identifying and presenting related information of interest from other free text documents. The goal is to find specific related items of interest within documents whether the documents are of the same category or not. Information of interest is defined with respect to expanded entity phrases and their ontology mappings. Powerful techniques requiring minimal training are described for expanding an entity phrase to include attributes from components of a complex sentence; for measuring relatedness of same-name expanded entity phrases; and for detecting related expanded entity phrases through ontology inferences. A representative dataset is described and preliminary measurements of performance against ground truth are provided.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124795967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The construction of accounting information system under the environment of the network 网络环境下会计信息系统的建设
Xiaoting Li, Jingfu Yang, Zishan Wang
{"title":"The construction of accounting information system under the environment of the network","authors":"Xiaoting Li, Jingfu Yang, Zishan Wang","doi":"10.1109/ISI.2011.5984773","DOIUrl":"https://doi.org/10.1109/ISI.2011.5984773","url":null,"abstract":"On the computer and network technology as its symbol of information trend changed the world, including accounting, various industries caused profound effect, this trend not only change the habit of people thinking, has also changed the way of people work. The traditional book accounting system has been increasingly replaced by computer, database and the network accounting system, make efficiency and lower cost. But at the same time, a new network accounting system also brought a safety problem, particularly, as the continued computer network security technology development; this problem is becoming more and more outstanding. The issues of accounting information system is a system problems, only by the security technology and safety product cannot guarantee the system safety, only from the view of the system, and set up the comprehensive security system, so can better cope with the serious security challenges.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132399029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing group communication for preventing data leakage via email 分析群组通信,防止邮件数据泄露
Polina Zilberman, S. Dolev, Gilad Katz, Y. Elovici, A. Shabtai
{"title":"Analyzing group communication for preventing data leakage via email","authors":"Polina Zilberman, S. Dolev, Gilad Katz, Y. Elovici, A. Shabtai","doi":"10.1109/ISI.2011.5984047","DOIUrl":"https://doi.org/10.1109/ISI.2011.5984047","url":null,"abstract":"Modern business activities rely on extensive email exchange. Various solutions attempt to analyze email exchange in order to prevent emails from being sent to the wrong recipients. However there are still no satisfying solutions; many email addressing mistakes are not detected and in many cases correct recipients are wrongly marked as potential addressing mistakes. In this paper we present a new approach for preventing emails addressing mistakes in organizations. The approach is based on analysis of emails exchange among members of the organization and the identification of groups based on common topics. Each member's topics are then used during the enforcement phase for detecting potential leakage. When a new email is composed and about to be sent, each email recipient is analyzed. A recipient is approved if the email's content belongs to at least one of the topics common to the sender and the recipient. We evaluated the new approach using the Enron Email dataset. Our evaluation results suggest that the new approach easily copes with email recipients that have no previous direct connection with the sender.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128444890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信