Document Type
Conference Proceeding
Publication Date
5-2005
Abstract
Verification of legitimate access of documents, which is one aspect of the umbrella of problems in the Insider Threat category, is a challenging problem. This paper describes the research and prototyping of a system that takes an ontological approach, and is primarily targeted for use by theintelligence community. Our approach utilizes the notion of semantic associations and their discovery among a collection of heterogeneous documents. We highlight our contributions in (graphically) capturing the scope of the investigation assignment of an intelligence analyst by referring to classes and relationships of an ontology; in computing a measure of the relevance of documents accessed by an analyst with respect to his/her assignment; and by describing the components of our system that have provided early yet promising results, and which will be further evaluated more extensively based on domain experts and sponsor inputs.
Repository Citation
Aleman-Meza, B.,
Burns, P.,
Eavenson, M.,
Palanswami, D.,
& Sheth, A. P.
(2005). An Ontological Approach to the Document Access Problem of Insider Threat. Lecture Notes in Computer Science, 3495, 486-491.
https://corescholar.libraries.wright.edu/knoesis/702
DOI
10.1007/11427995_47
Included in
Bioinformatics Commons, Communication Technology and New Media Commons, Databases and Information Systems Commons, OS and Networks Commons, Science and Technology Studies Commons
Comments
Presented at the IEEE International Conference on Intelligence and Security Informatics, Atlanta, GA, May 19-20, 2005.
Attached is the unpublished, author's version of this proceeding. The final publication is available at Springer via http://dx.doi.org/10.1007/11427995_47.