Security policy reasoning with the automated transaction graph for financial crime

LAUNDERS, Ivan and POLOVINA, Simon (2013). Security policy reasoning with the automated transaction graph for financial crime. In: AKHGAR, Babak and YATES, Simeon, (eds.) Strategic intelligence management. Butterworth-Heinemann, 150-166.

Full text not available from this repository.

Abstract

Fraudulent transactions fuel the criminal misuse of identity details and pose a serious threat to national security. This issue is heightened by the growing sophistication of business transactions using payment cards, causing its policing to be increasingly difficult. Both public and private sector organizations are required by law to comply with industry standards for information technology security and these standards normally mandate the creation of security policies and audit trails for these enterprises, especially from key systems holding sensitive information. Enterprise architects have traditionally defined security policy and relied upon technical controls to secure enterprise systems against cyber threats and misuse. However, within ever-more complex transactional information systems it is difficult to achieve compliance and analyze security policy rules without the ability to capture and model the complexity of security at a business level. Using a simple financial trading case study as an illustration, we propose a semantic approach to security policy reasoning using conceptual graphs. This approach provides ontology that enables enterprise architects to capture the semantics of fraudulent transactions through security policy rules.

Item Type: Book Section
Research Institute, Centre or Group - Does NOT include content added after October 2018: Cultural Communication and Computing Research Institute > Communication and Computing Research Centre
Departments - Does NOT include content added after October 2018: Faculty of Science, Technology and Arts > Department of Computing
Page Range: 150-166
Depositing User: Helen Garner
Date Deposited: 22 Apr 2013 12:33
Last Modified: 18 Mar 2021 19:45
URI: https://shura.shu.ac.uk/id/eprint/6846

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics