Skip to main content
Presentation
An Ontological Approach to the Document Access Problem of Insider Threat
Lecture Notes in Computer Science
  • Boanerges Aleman-Meza
  • Phillip Burns
  • Matthew Eavenson
  • Devanand Palanswami
  • Amit P. Sheth, Wright State University - Main Campus
Document Type
Conference Proceeding
Publication Date
5-1-2005
Abstract

Verification of legitimate access of documents, which is one aspect of the umbrella of problems in the Insider Threat category, is a challenging problem. This paper describes the research and prototyping of a system that takes an ontological approach, and is primarily targeted for use by theintelligence community. Our approach utilizes the notion of semantic associations and their discovery among a collection of heterogeneous documents. We highlight our contributions in (graphically) capturing the scope of the investigation assignment of an intelligence analyst by referring to classes and relationships of an ontology; in computing a measure of the relevance of documents accessed by an analyst with respect to his/her assignment; and by describing the components of our system that have provided early yet promising results, and which will be further evaluated more extensively based on domain experts and sponsor inputs.

Comments

Presented at the IEEE International Conference on Intelligence and Security Informatics, Atlanta, GA, May 19-20, 2005.

Attached is the unpublished, author's version of this proceeding. The final publication is available at Springer via http://dx.doi.org/10.1007/11427995_47.

DOI
10.1007/11427995_47
Citation Information
Boanerges Aleman-Meza, Phillip Burns, Matthew Eavenson, Devanand Palanswami, et al.. "An Ontological Approach to the Document Access Problem of Insider Threat" Lecture Notes in Computer Science Vol. 3495 (2005) p. 486 - 491 ISSN: 9783540259992
Available at: http://works.bepress.com/amit_sheth/49/