{"title":"Colored Petri Nets Based Modeling of Information Flow Security","authors":"Weiguo Li, Ruoyu Wu, He Huang","doi":"10.1109/WKDD.2009.171","DOIUrl":null,"url":null,"abstract":"Currently, with the popularization of the computer and Internet technologies, electronic documents have become the most important resource in enterprises or organizations. The security of documents and protecting the information resident in these documents is of paramount importance to the organization’s progress and in some cases, their survival too. Hence, electronic documents are the target of the insider abuse and attacker. Traditionally, methods of document access control protect the information of documents by setting accessing privileges. However, the weaknesses of this are the coarse granularity of control and lack of capability to adjust dramatically to adapt well to different operating context. In this paper, an information flaw security model based on colored Petri nets (CPN) is introduced, which analyze information flow dynamically and then find out the potential approaches that lead to the leak of information by examining the reachability graph of the CPN model. Consequently, we can take some measures to prevent information leaks and achieve the goal of protecting confidential information.","PeriodicalId":143250,"journal":{"name":"2009 Second International Workshop on Knowledge Discovery and Data Mining","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Second International Workshop on Knowledge Discovery and Data Mining","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WKDD.2009.171","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Currently, with the popularization of the computer and Internet technologies, electronic documents have become the most important resource in enterprises or organizations. The security of documents and protecting the information resident in these documents is of paramount importance to the organization’s progress and in some cases, their survival too. Hence, electronic documents are the target of the insider abuse and attacker. Traditionally, methods of document access control protect the information of documents by setting accessing privileges. However, the weaknesses of this are the coarse granularity of control and lack of capability to adjust dramatically to adapt well to different operating context. In this paper, an information flaw security model based on colored Petri nets (CPN) is introduced, which analyze information flow dynamically and then find out the potential approaches that lead to the leak of information by examining the reachability graph of the CPN model. Consequently, we can take some measures to prevent information leaks and achieve the goal of protecting confidential information.