International Journal of Man-Machine Studies
Chinese Wall Security Model and Conflict Analysis
COMPSAC '00 24th International Computer Software and Applications Conference
Placing the Chinese Walls on the Boundary of Conflicts - Analysis of Symmetric Binary Relations
COMPSAC '02 Proceedings of the 26th International Computer Software and Applications Conference on Prolonging Software Life: Development and Redevelopment
Granular Computing on Binary Relations
TSCTC '02 Proceedings of the Third International Conference on Rough Sets and Current Trends in Computing
Reduction and axiomization of covering generalized rough sets
Information Sciences: an International Journal
An inquiry into anatomy of conflicts
Information Sciences: an International Journal
Granular computing: structures, representations, and applications
RSFDGrC'03 Proceedings of the 9th international conference on Rough sets, fuzzy sets, data mining, and granular computing
Incident and casualty databases as a tool for understanding low-intensity conflicts
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
An ontological approach to the document access problem of insider threat
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
A study of ”root causes of conflict” using latent semantic analysis
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
Recognition in software watermarking
Proceedings of the 4th ACM international workshop on Contents protection and security
Properties of the Second Type of Covering-Based Rough Sets
WI-IATW '06 Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology
On Three Types of Covering-Based Rough Sets
IEEE Transactions on Knowledge and Data Engineering
Relationship between generalized rough sets based on binary relation and covering
Information Sciences: an International Journal
Relationship among basic concepts in covering-based rough sets
Information Sciences: an International Journal
Knowledge Reduction of Covering Approximation Space
Transactions on Computational Science V
Evaluating the disaster defense ability of information systems
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
An application of covering approximation spaces on network security
Computers & Mathematics with Applications
Associated-conflict analysis using covering based on granular computing
LSMS/ICSEE'10 Proceedings of the 2010 international conference on Life system modeling and and intelligent computing, and 2010 international conference on Intelligent computing for sustainable energy and environment: Part I
Covering based approximation – a new type approach
International Journal of Computational Vision and Robotics
Covering rough sets based on neighborhoods: An approach without using neighborhoods
International Journal of Approximate Reasoning
Binary relation based rough sets
FSKD'06 Proceedings of the Third international conference on Fuzzy Systems and Knowledge Discovery
The fourth type of covering-based rough sets
Information Sciences: an International Journal
Information-theoretic measures associated with rough set approximations
Information Sciences: an International Journal
An Axiomatic Approach to the Roughness Measure of Rough Sets
Fundamenta Informaticae
Hi-index | 0.00 |
Conflicts are widespread in our society owing to the scarcity of physical resources, different cultures and religions. The Chinese Wall security policy is a conflicts model originally proposed by Brewer and Nash for information access control. The rapid development of intelligence and security informatics prompts us to revisit this policy and we use granular computing based on covering rough set theory to study the problems of conflicts of interest in database access security. This new method catches the IAR(in ally with relation) more accurately. It also has potential application to issues in intelligence and security informatics such as information sharing policy and governance.