Introduction to Panels on E-Security, Granular Computing and Web Intelligence
نویسنده
چکیده
A common definition of computer security is: ” a system is secure if it adequately protects information that it processes against unauthorized disclosure, unauthorized modification, and unauthorized withholding (denial of service).” Currently, no systems can assure all of these. The first major efforts on such a system is the so called mandatory access control (MAC). It is for military security. The main idea is the control of information flows. In commercial side, a commonly used model is called discretionary access control (DAC). It is based on a totally different concept. In spite of its popularity DAC is known to be, due to the Trojan horse problem, not a secure system under this definition. The E-security, often implemented in DAC form, does need stronger security; information flows do need to be regulated. For example, an HIP patient may has to give his information to Medical organization, yet he definitely does not want the information being forward to insurance company. DAC is powerless on this; some have suggested that we regulate by the privacy law. However, the law cannot stop the Trojan horse. Recent development of granular computing does provide some light on E-security; that will be addressed by T. Y. Lin in this panel.
منابع مشابه
Granular fuzzy Web intelligence techniques for profitable data mining
AbsfracfData mining has a lot of e-Commerce applications. The key problem is how to tind useful hidden patterns for better business applications. For these problems, granular fuzzy Web intelligence techniques are used to implement the granular fuzzy Web data mining system for available historical data of the credit company customers. Fuzzy computing and granular computing are used to design the...
متن کاملبررسی تأثیرات رایانش ابری بر یادگیری الکترونیکی
In the world of training, online training is introduced as a modern model of training services. Cloud computing is a modern technology which is provided software, infrastructure and platform as internet. Also, online training is introduced as a modern model of training services on the web. In this research, the impact of cloud computing on e-learning on the case of Mehralborz online university ...
متن کاملGranular Support Vector Machines Based on Granular Computing, Soft Computing and Statistical Learning
With emergence of biomedical informatics, Web intelligence, and E-business, new challenges are coming for knowledge discovery and data mining modeling problems. In this dissertation work, a framework named Granular Support Vector Machines (GSVM) is proposed to systematically and formally combine statistical learning theory, granular computing theory and soft computing theory to address challeng...
متن کاملINTERVAL ANALYSIS-BASED HYPERBOX GRANULAR COMPUTING CLASSIFICATION ALGORITHMS
Representation of a granule, relation and operation between two granules are mainly researched in granular computing. Hyperbox granular computing classification algorithms (HBGrC) are proposed based on interval analysis. Firstly, a granule is represented as the hyperbox which is the Cartesian product of $N$ intervals for classification in the $N$-dimensional space. Secondly, the relation betwee...
متن کاملAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006