consideration the subsequent effects of the correlated
anomalies, in addition to the direct impact caused by
the same anomalies on the whole database access
control system. For that reason, our system is
designed to be as global and comprehensive as
possible.
At the present stage of our work, we have already
furnished in a recent publication, the description of
the proposed framework for the overall risk
management system for our approach. The paper that
presents in details the correlation management
subsystem is also under process.
In a close future, we intend to concretely and
practically evaluate the correlated risk and the overall
risk with real case studies with real database.
REFERENCES
Sandhu, R., Coynek, E. J., Feinsteink, H. L., and Youmank,
C. E., 1996. Role-Based Access Control Models, IEEE
Computer, vol. 29, no. 2, (pp. 38-47)
International Electrotechnical Commission, International
Standard, ISO/IEC 27000:2014,
International Electrotechnical Commission, International
Standard, ISO/IEC 31010:2009, First Edition, 2009.
Cheng, P.-C., Rohatgi, P., Keser, C., Karger, P.A., Wagner,
G.M., Reninger, A.S., 2007. Fuzzy MLS: An
Experiment on Quantified Risk–Adaptive Access
Control, In Security and Privacy, (pp.222–230).
Bertino, E., Ghinita, G., Kamra, A., 2011. “Access Control
for Databases: Concepts and Systems” Foundations and
Trends in Databases Vol. 3, http://dx.doi.org/10.1561/
1900000014.
Khambhammettu, H., Boulares, B., Adi, A., Logrippo, L.,
2012. “A framework for threat assessment in access
control systems” that appeared in Proceedings of 27th
IFIP TC 11 Information Security and Privacy
Conference. http://dx.doi.org/10.1007/978-3-642-
30436-1_16
Diep, N. N., Hung, L. X., Zhung, Y., Lee, S., Lee, Y. K.,
Lee, H., 2007. “Enforcing Access Control Using Risk
Assessment”, Proceedings of the Fourth European
Conference on Universal Multiservice Networks
(ECUMN'07). http://dx.doi.org/10.1109/ECUMN.
2007.19
Colantonio, A., Di Pietro, R., Ocello, A., Verde, N.V.,
2010. “Evaluating the Risk of Adopting RBAC Roles”,
ara Foresti; Sushil Jajodia. Data and Applications
Security and Privacy XXIV, 6166, Springer.
http://dx.doi.org/10.1016/j.dss.2010.08.022
Burnett, C., Chen, L., Edwards, P., Norman, T. J.,
“TRAAC: Trust and Risk Aware Access Control”,
2014. Twelfth Annual International Conference on
Privacy, Security and Trust (PST). http://dx.doi.org/10.
1109/PST.2014.6890962.
Ma, J., Adi, K., Mejri, M., Logrippo, L., 2010. Risk analysis
in access control systems. In Eighth Annual
International Conference on Privacy Security and Trust
(PST), pp. 160-166
Baracaldo, N., Joshi, J., 2013. “An adaptive risk
management and access control framework to mitigate
insider threats”, Computers & Security. http://dx.doi.
org/10.1016/j.cose.2013.08.001.
Celikel, E., Kantarcioglu, M., Thuraisingham; D., Bertino,
E., 2009. A risk management approach to RBAC”. Risk
and Decision Analysis 1 (2009) 21–33. DOI
10.3233/RDA-2008-0002. IOS Press
Costante, E., Vavilis, S., Etalle, S., Petkovic M., Zannone,
N., 2013. Database Anomalous Activities: Detection
and Quantification, SECRYPT 2013: 603-608.
Grushka-Cohen, H., Sofer, O., Biller, O., Shapira, B.,
Rokach, L., 2016. CyberRank-Knowledge Elicitation
for Risk Assessment of Database Security, 2016 ACM.
DOI: http://dx.doi.org/10.1145/ 2983323.2983896.
Darwish, S. M., 2015. Machine learning approach to detect
intruders in database based on hexplet data structure.
Journal of Electrical Systems and Information
Technology 3 (2016) 261–269 http://dx.doi.org/10.
1016/j.jesit.2015.12.001.
DCENASE 2018 - Doctoral Consortium on Evaluation of Novel Approaches to Software Engineering
22