Document Type

Conference Proceeding

Publication Date

5-2005

Abstract

Verification of legitimate access of documents, which is one aspect of the umbrella of problems in the Insider Threat category, is a challenging problem. This paper describes the research and prototyping of a system that takes an ontological approach, and is primarily targeted for use by theintelligence community. Our approach utilizes the notion of semantic associations and their discovery among a collection of heterogeneous documents. We highlight our contributions in (graphically) capturing the scope of the investigation assignment of an intelligence analyst by referring to classes and relationships of an ontology; in computing a measure of the relevance of documents accessed by an analyst with respect to his/her assignment; and by describing the components of our system that have provided early yet promising results, and which will be further evaluated more extensively based on domain experts and sponsor inputs.

Comments

Presented at the IEEE International Conference on Intelligence and Security Informatics, Atlanta, GA, May 19-20, 2005.

Attached is the unpublished, author's version of this proceeding. The final publication is available at Springer via http://dx.doi.org/10.1007/11427995_47.

DOI

10.1007/11427995_47


Share

COinS