{"title":"关于数据重要性分析","authors":"S. Kiyomoto, Yutaka Miyake","doi":"10.1109/INCoS.2011.127","DOIUrl":null,"url":null,"abstract":"Accidents of information leakage and insider threats by malicious employee are major issues in enterprise IT system. Data importance analysis methods can resolve this issue, the importance of data is automatically analyzed by the method and confirms whether the operation suits the security policy for the level of importance of the data. Insider threads are also protected by analyzing data importance and data flows. A mechanism to ascertain data importance via automatic analysis is useful for avoiding human error. The mechanism finds the appropriate category for user sent data in terms of data importance, highly secret, important, and unclassified. In this paper, we presented an analysis method and discussed its application. It will apply to information leakage by both human error and insider threads. The method is a combination of data diagnosis and data categorization, and it can analyze whether the transaction to send the data compiles with the security policy.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"On Data Importance Analysis\",\"authors\":\"S. Kiyomoto, Yutaka Miyake\",\"doi\":\"10.1109/INCoS.2011.127\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Accidents of information leakage and insider threats by malicious employee are major issues in enterprise IT system. Data importance analysis methods can resolve this issue, the importance of data is automatically analyzed by the method and confirms whether the operation suits the security policy for the level of importance of the data. Insider threads are also protected by analyzing data importance and data flows. A mechanism to ascertain data importance via automatic analysis is useful for avoiding human error. The mechanism finds the appropriate category for user sent data in terms of data importance, highly secret, important, and unclassified. In this paper, we presented an analysis method and discussed its application. It will apply to information leakage by both human error and insider threads. The method is a combination of data diagnosis and data categorization, and it can analyze whether the transaction to send the data compiles with the security policy.\",\"PeriodicalId\":235301,\"journal\":{\"name\":\"2011 Third International Conference on Intelligent Networking and Collaborative Systems\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-11-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 Third International Conference on Intelligent Networking and Collaborative Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INCoS.2011.127\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INCoS.2011.127","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Accidents of information leakage and insider threats by malicious employee are major issues in enterprise IT system. Data importance analysis methods can resolve this issue, the importance of data is automatically analyzed by the method and confirms whether the operation suits the security policy for the level of importance of the data. Insider threads are also protected by analyzing data importance and data flows. A mechanism to ascertain data importance via automatic analysis is useful for avoiding human error. The mechanism finds the appropriate category for user sent data in terms of data importance, highly secret, important, and unclassified. In this paper, we presented an analysis method and discussed its application. It will apply to information leakage by both human error and insider threads. The method is a combination of data diagnosis and data categorization, and it can analyze whether the transaction to send the data compiles with the security policy.