Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(344.83KB)
This is an Open Access publication published under CSC-OpenAccess Policy.
Publications from CSC-OpenAccess Library are being accessed from over 74 countries worldwide.
Analysis of N Category Privacy Models
Marn-Ling SHING, Chen-Chi SHING, Lee-Pin Shing, Lee-Hur Shing
Pages - 342 - 358     |    Revised - 15-09-2012     |    Published - 25-10-2012
Volume - 6   Issue - 5    |    Publication Date - October 2012  Table of Contents
MORE INFORMATION
KEYWORDS
Privacy Model, Confidentiality Model, Information Security Model
ABSTRACT
File sharing becomes popular in social networking and the disclosure of private information without user’s consent can be found easily. Password management becomes increasingly necessary for maintaining privacy policy. Monitoring of violations of a privacy policy is needed to support the confidentiality of information security. This paper extends the analysis of two category confidentiality model to N categories, and illustrates how to use it to monitor the security state transitions in the information security privacy modeling.
CITED BY (2)  
1 Shing, L., Astacio, J., Figueroa, A., & Shing, C. C. (2015, August). Vulnerabilities of radio frequencies. In Fuzzy Systems and Knowledge Discovery (FSKD), 2015 12th International Conference on (pp. 2682-2686). IEEE.
2 Shing, L. P., Shing, L. H., Shing, M. L., & Shing, C. C. (2015). modeling data integrity under stochastic linear constraints. International Journal of Electronic Commerce Studies, 6(2), 233-242.
1 Google Scholar 
2 CiteSeerX 
3 refSeek 
4 TechRepublic 
5 Scribd 
6 SlideShare 
7 PdfSR 
1 CNSS (The Committee on National Security Systems) 4009, 2003.
2 S. Lipner, Non-discretionary control for commercial applications, Proceedings of the 1982 Symposium on Privacy and Security, 2-10, 1982.
3 K. Hsu and Z. Zhu, “SAS 99 – Consideration of fraud in a financial statement audit: a new auditing standard”, International Journal of Services and Standards, Vol. 1, No.4, 2005, pp. 414 – 425.
4 M. Lee and T. Chang, “Applying ISO 17799:2005 in information security management”,International Journal of Services and Standards, Vol. 3, No.3, 2007, pp. 352 – 373.
5 M. Bishop, Computer Security, Addison-Wesley, 2003.
6 M. Shing, C. Shing, K. Chen and H. Lee. (2006). “Security Modeling on the Supply Chain Networks”, Journal of Systemics, Cybernetics and Informatics, 2008 , Vol. 5, No. 5, pp. 53-58.
7 K. Biba, “Integrity considerations for secure computer systems”, Technical Report MTR-3153,1, Bedford, MA: MITRE Corporation, 1977.
8 D. Brewer and M. Nash, “ The Chinese wall security policy”, Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989, pp.206-214.
9 D. Clark and D. Wilson, “A comparison of commercial and military security policies”,Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987, pp. 184-194.
10 D. Bell and L. LaPadula,, “Secure computer systems: Mathematical foundations”, Technical Report MTR-2574, I, Bedford, MA: MITRE Corporation, 1973.
11 D. Bell and L. LaPadula, “Secure computer system: Unified exposition and multics Interpretation”, Technical Report MTR-2997, Rev. 1, Bedford, MA: MITRE Corporation, 1975.
12 K Chen, H. Lee and J. Yang, ‘Security Considerations on the Design of Supply Chain Networks’, the Proceedings of Southwest Decision Sciences Institute, Vol. 14, No. 1/2/3, 2006.
13 K. Chen, M. Shing, C. Shing and H. Lee, “Modeling in Confidentiality and Integrity for a Supply Chain Network,” Communications of the IIMA, 2007.
14 M. Shing, C. Shing, K. Chen and H. Lee. (2006). “Security Modeling on the Supply Chain Networks”, Proceedings of EIST 2006, Orlando, FL.
15 M. Shing, C. Shing, K. Chen and H. Lee. “A Simulation Study of Confidentiality Modeling in a Secured Supply Chain Network”, Proceedings of International Symposium on Intelligent.Information Technology Application conference, Dec. 22-23,2008, Shanghai, China.
16 P. Bremaud, Markov Chains. New York: Springer, 1999.
17 M. Aburdene, Computer Simulation of Dynamic Systems, Wm. C. Brown Publishing, 1988.
18 Bhat, N. (1972). Elements of Applied Stochastic Processes, John Wiley & Sons.
19 M. Molloy, Fundamentals of Performance Modeling. New York: Macmillan Publishing., 1989.
20 G. McDaniel, IBM Dictionary of Computing. New York, NY: McGraw-Hill, Inc., 1994.
21 A. Smith, “Strategic aspects of electronic document encryption”, International Journal of Services and Standards, Vol. 3, No.2, 2007, pp. 203 – 221.
22 M. Shing, C. Shing, L. Shing. (2012). “Analysis of a Two Category Confidentiality Model In Information Security”, Journal of Communication and Computer, USA, 3(1), 2012.
23 J. Banks, J. Carson, B. Nelson, Discrete Event System Simulation, New Jersey, Prentice Hall, 1996.
24 A. Rencher, Methods of Multivariate Analysis. New York: John Wiley & Sons, 1995.
25 E. Parzen, Stochastic Processes. San Francisco: Holden-Day., 1967.
26 A. Smith, “Supply chain management using electronic reverse auctions: a multi-firm case study”, International Journal of Services and Standards, Vol. 2, No.2, 2006, pp. 176 – 189.
Dr. Marn-Ling SHING
Taipei Municipal University of Education - Taiwan
shing@tmue.edu.tw
Dr. Chen-Chi SHING
Radford University - United States of America
Mr. Lee-Pin Shing
Virginia Tech - United States of America
Miss Lee-Hur Shing
Virginia Tech - United States of America