Global Defense
No Result
View All Result
  • Login
  • Register
  • Home
  • Air
  • Land
  • Naval
  • Space
  • War & Conflict
  • Business
  • Science & Tech
Contact
Newsletter
Global Defense
  • Home
  • Air
  • Land
  • Naval
  • Space
  • War & Conflict
  • Business
  • Science & Tech
No Result
View All Result
Global Defense
No Result
View All Result
Home Science & Tech

New Tool Streamlines Pentagon’s Data Access Security

Alex by Alex
January 14, 2025
Reading Time: 2 mins read
0
New Tool Streamlines Pentagon’s Data Access Security

The Pentagon’s new strategy for safeguarding sensitive information focuses on continuous monitoring to prevent unauthorized access to data. This “zero trust” approach aims to eliminate leaks caused by insiders. However, the rapid changes in roles, data, and workflows challenge administrators in keeping pace with access control. A Japanese research team has proposed a solution to enhance this process.

RELATED POSTS

Rachel Riley: Navy’s New Chief Driving Reform and Innovation

Space Force Report Advocates for Guardians in Orbit

Integrating Technologies Crucial for Future Warfare

Role-Based Access Control (RBAC) is a widely recognized framework that assigns access permissions based on user roles within an organization. For instance, a financial officer can access payroll data, while a marketing team member cannot. Although RBAC is effective, it can hinder users with security checks and often requires manual oversight, especially in complex or dynamic workflows.

In a publication in the *International Journal of Software Engineering and Knowledge Engineering*, researchers from the University of Electro-Communications in Tokyo recommend integrating RBAC with Unified Modeling Language (UML). UML visually represents system structures and behaviors, allowing organizations to depict their workflows and better comprehend the relationships between roles and permissions. This integration could potentially improve real-time monitoring and understanding of access appropriateness.

The research team utilized process-mining techniques, analyzing event logs that record system activities to map task execution. These logs are crucial for identifying weaknesses in access control policies but often contain errors such as missing or duplicate entries. To address this, advanced preprocessing methods were applied to ensure data reliability.

Using refined event logs, the researchers deployed Petri nets and Business Process Model and Notation (BPMN), both recognized standards for modeling workflows. While Petri nets use mathematical representations, BPMN offers visual diagrams of task flows. The models were converted into UML diagrams through an automated method known as Transformation Method for BPMN Conversion, allowing for a more transparent identification of access control vulnerabilities.

Combining RBAC with UML effectively tackles complexities and inconsistencies in managing access to sensitive information systems. A traditional maze of permissions can be reformulated into a simplified, interactive map, assisting administrators in identifying and rectifying issues that could leave gaps for exploitation.

The significance of this advancement lies in its application to highly sensitive systems within government and defense sectors. A poorly handled access policy can lead to serious repercussions. A notable example is the case of former Air National Guardsman Jack Teixeira, who leaked classified information after misusing his credentials, highlighting the potential fallout from insider threats.

To demonstrate their method’s efficacy against existing RBAC frameworks, the researchers examined two cases: a simulated e-commerce workflow and a real-world loan approval process. In the e-commerce scenario, a violation of the “Separation of Duty” policy—mandating that different roles handle distinct tasks—was uncovered, guiding administrators on redesigning access policies.

In the second case study, involving over 31,000 loan approvals at a Dutch financial institution, the team successfully detected violations of “Dynamic Separation of Duty” policies. This automated detection saves administrators significant time and effort, especially in complex systems where errors are often overlooked.

The implications of this research are vital for government and defense organizations managing sensitive data. Enhanced visibility and flexibility in access control systems can diminish unauthorized access risks while maintaining operational efficiency. However, the framework’s effectiveness hinges on accurate knowledge to define rules; incomplete or inconsistent policy definitions could lead to inadequate system performance. The researchers plan to refine their approach further by integrating machine learning techniques to bolster the framework’s capabilities.

ShareTweetShare

Related Posts

Rachel Riley: Navy’s New Chief Driving Reform and Innovation
Science & Tech

Rachel Riley: Navy’s New Chief Driving Reform and Innovation

November 12, 2025
Space Force Report Advocates for Guardians in Orbit
Science & Tech

Space Force Report Advocates for Guardians in Orbit

November 7, 2025
Integrating Technologies Crucial for Future Warfare
Science & Tech

Integrating Technologies Crucial for Future Warfare

October 31, 2025
Pacific Fleet’s Bold Push for Rapid Tech Innovation
Science & Tech

Pacific Fleet’s Bold Push for Rapid Tech Innovation

October 30, 2025
Army Unveils Game-Changing Autonomous Drone Strategy
Science & Tech

Army Unveils Game-Changing Autonomous Drone Strategy

October 21, 2025
Army Launches Next-Gen Command System Field Test
Science & Tech

Army Launches Next-Gen Command System Field Test

October 17, 2025
Next Post
Air Force Weighs Manned Jet vs. Drones for Future Warfare

Air Force Weighs Manned Jet vs. Drones for Future Warfare

Russia Claims Control of Two New Villages in Ukraine

Russia Captures Key Ukrainian Mining Village Near Pokrovsk

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended Stories

Ukrainian Children’s Hospital in Kyiv Devastated by Russian Missile Strikes, Resulting in 24 Fatalities

July 8, 2024
Saudi Arabia finalizes $3.2 billion agreement with South Korea for air defense systems

Saudi Arabia finalizes $3.2 billion agreement with South Korea for air defense systems

February 7, 2024
Army integrating robots in two platoons: Robots join the ranks

Army integrating robots in two platoons: Robots join the ranks

December 27, 2023

Popular Stories

  • Germany Approves €7 Billion Defense Procurement Boost

    Germany Approves €7 Billion Defense Procurement Boost

    0 shares
    Share 0 Tweet 0
  • Find out the timeline for the US Army to select its next long-range spy plane

    0 shares
    Share 0 Tweet 0
  • Silvus and Kagwerks combine radios and chest rigs for enhanced battle communications

    0 shares
    Share 0 Tweet 0
  • Palantir selected by Army to develop advanced targeting system

    0 shares
    Share 0 Tweet 0
  • Poland Eyes New Submarine Deals as Deadline Approaches

    0 shares
    Share 0 Tweet 0
Global Defense

Global Defense is an online news source that provides up-to-date information on defense-related news and essential insights into military strategies for its readers. The site offers a comprehensive perspective for readers interested in the defense industry by delivering in-depth analyses and reports on national security, weapon systems, military technology, and strategic matters.

Recent Posts

  • Joby Aviation Tests Autonomous VTOL for Defense Use
  • Colombia Halts US Intelligence Over Drug War Strikes
  • Anduril Partners with HD Hyundai for Autonomous Fleet

Categories

  • Air
  • Business
  • Land
  • Naval
  • Science & Tech
  • Space
  • War & Conflict

© 2023 Global Defense. All right reserved. Developed by Webixmo.

No Result
View All Result
  • Home
  • Air
  • Land
  • Naval
  • Space
  • War & Conflict
  • Business
  • Science & Tech

© 2023 Global Defense. All right reserved. Developed by Webixmo.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In