........................................................................................................................................................ II PREFACE .......................................................................................................................................................... III SUMMARY ........................................................................................................................................................ IV ACKNOWLEDGEMENTS ......................................................................................................................................... V TABLE OF CONTENTS ......................................................................................................................................... VII LIST OF FIGURES ................................................................................................................................................. X LIST OF TABLES .................................................................................................................................................. XI CHAPTER 1: INTRODUCTION ‐ PROBLEM STATEMENT ................................................................... 1 1.1 INTRODUCTION ........................................................................................................................................ 1 1.2 PROBLEM STATEMENT .............................................................................................................................. 2 1.3 RESEARCH QUESTIONS .............................................................................................................................. 4 1.4 RESEARCH HIERARCHY AND METHODOLOGY .................................................................................................. 6 1.5 SCOPE AND CONTEXT OF THE STUDY ............................................................................................................. 7 1.6 TERMINOLOGY USED IN THE THESIS .............................................................................................................. 7 1.7 LAYOUT OF THESIS .................................................................................................................................... 8 CHAPTER 2: CASE STUDY ‐ DM BANK .................................................................................... 10 2.1 INTRODUCTION ...................................................................................................................................... 11 2.2 CASE STUDY .......................................................................................................................................... 11 2.2.1 ABC Petrol’s environment ........................................................................................................ 11 2.2.2 DM Bank’s environment .......................................................................................................... 13 2.3 ACCESS CONTROL AND THE DATA‐MINING ENVIRONMENT OF DM BANK ........................................................... 16 CHAPTER 3: EMERGING THEORIES AND PERSPECTIVES RELEVANT TO ACCESS CONTROL AND SECURITY POLICIES ......................................................................................................................... 18 3.1 INTRODUCTION ...................................................................................................................................... 19 3.2 ACCESS CONTROL TERMINOLOGY .............................................................................................................. 19 3.3 SECURITY POLICIES AND ACCESS CONTROL POLICIES ...................................................................................... 20 3.4 ACCESS CONTROL MODELS ...................................................................................................................... 21 3.4.1 Access Control Models for Confidentiality ............................................................................... 22 3.4.1.1 Bell‐La Padula Model (BLP) ........................................................................................................... 22 3.4.1.2 Lampson model; Graham‐Denning model; Harrison‐Ruzzo‐Ullman model .................................. 23 3.4.2 Access Control Models for Conflict .......................................................................................... 24 3.4.2.1 Chinese Wall Security Policy Model .............................................................................................. 24 3.4.2.2 Aggressive Chinese Wall Security Policy Model ............................................................................ 26 3.4.3 Access Control Models for a Data‐Mining Environment .......................................................... 26 3.4.3.1 Privacy‐Preserving Access Control ................................................................................................ 26 3.4.3.2 Privacy‐Aware Access Control ....................................................................................................... 27 3.4.3.3 Privacy‐Enhanced Access Control .................................................................................................. 27 3.5 ACCESS CONTROL MODEL SUMMARY ........................................................................................................ 28 3.6 CONCLUSION ......................................................................................................................................... 29 CHAPTER 4: EMERGING THEORIES AND PERSPECTIVES RELEVANT TO ACCESS CONTROL AND DATA MINING ..................................................................................................................................... 30 4.1 INTRODUCTION ...................................................................................................................................... 31 4.2 THE DATA‐MINING PROCESS .................................................................................................................... 32 4.2.1 Business‐understanding Step [Daimler‐Benz, et al.] ................................................................ 33 4.2.1.1 Determine the business objectives ............................................................................................... 33 4.2.1.2 Determine and assess the details of the business situation .......................................................... 34 4.2.1.3 Determine the data‐mining goals .................................................................................................. 34 4.2.1.4 Produce a project plan .................................................................................................................. 34