IDEAS home Printed from https://ideas.repec.org/p/rug/rugwps/12-811.html
   My bibliography  Save this paper

Improved Multilevel Security with Latent Semantic Indexing

Author

Listed:
  • D. THORLEUCHTER
  • D. VAN DEN POEL

Abstract

Multilevel security (MLS) is specifically created to protect information from unauthorized access. In MLS, documents are assigned to a security label by a trusted subject e.g. an authorized user and based on this assignment; the access to documents is allowed or denied. Using a large number of security labels lead to a complex administration in MLS based operating systems. This is because the manual assignment of documents to a large number of security labels by an authorized user is time-consuming and error-prone. Thus in practice, most MLS based operating systems use a small number of security labels. However, information that is normally processed in an organization consists of different sensitivities and belongs to different compartments. To depict this information in MLS, a large number of security labels is necessary. The aim of this paper is to show that the use of latent semantic indexing is successful in assigning textual information to security labels. This supports the authorized user by his manual assignment. It reduces complexity by the administration of a MLS based operating system and it enables the use of a large number of security labels. In future, the findings probably will lead to an increased usage of these MLS based operating systems in organizations.

Suggested Citation

  • D. Thorleuchter & D. Van Den Poel, 2012. "Improved Multilevel Security with Latent Semantic Indexing," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 12/811, Ghent University, Faculty of Economics and Business Administration.
  • Handle: RePEc:rug:rugwps:12/811
    as

    Download full text from publisher

    File URL: http://wps-feb.ugent.be/Papers/wp_12_811.pdf
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Moskovitch, Robert & Elovici, Yuval & Rokach, Lior, 2008. "Detection of unknown computer worms based on behavioral classification of the host," Computational Statistics & Data Analysis, Elsevier, vol. 52(9), pages 4544-4566, May.
    2. D. Thorleuchter & D. Van Den Poel & A. Prinzie, 2011. "Analyzing existing customers’ websites to improve the customer acquisition process as well as the profitability prediction in B-to-B marketing," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 11/733, Ghent University, Faculty of Economics and Business Administration.
    3. Bompard, E. & Napoli, R. & Xue, F., 2009. "Assessment of information impacts in power system security against malicious attacks in a general framework," Reliability Engineering and System Safety, Elsevier, vol. 94(6), pages 1087-1094.
    4. D. Thorleuchter & D. Van Den Poel & A. Prinzie & -, 2010. "A compared R&D-based and patent-based cross impact analysis for identifying relationships between technologies," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 10/632, Ghent University, Faculty of Economics and Business Administration.
    5. D. Thorleuchter & D. Van Den Poel & A. Prinzie & -, 2009. "Mining Ideas from Textual Information," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 09/619, Ghent University, Faculty of Economics and Business Administration.
    6. Scott Deerwester & Susan T. Dumais & George W. Furnas & Thomas K. Landauer & Richard Harshman, 1990. "Indexing by latent semantic analysis," Journal of the American Society for Information Science, Association for Information Science & Technology, vol. 41(6), pages 391-407, September.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. D. Thorleuchter & D. Van Den Poel, 2012. "Technology Classification with Latent Semantic Indexing," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 12/814, Ghent University, Faculty of Economics and Business Administration.
    2. D. Thorleuchter & D. Van Den Poel, 2012. "Protecting Research and Technology from Espionage," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 12/824, Ghent University, Faculty of Economics and Business Administration.
    3. D. Thorleuchter & D. Van Den Poel, 2013. "Semantic Compared Cross Impact Analysis," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 13/862, Ghent University, Faculty of Economics and Business Administration.
    4. D. Thorleuchter & D. Van Den Poel, 2013. "Quantitative Cross Impact Analysis with Latent Semantic Indexing," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 13/861, Ghent University, Faculty of Economics and Business Administration.
    5. D. Thorleuchter & D. Van Den Poel, 2013. "Weak Signal Identification with Semantic Web Mining," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 13/860, Ghent University, Faculty of Economics and Business Administration.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. D. Thorleuchter & D. Van Den Poel, 2013. "Weak Signal Identification with Semantic Web Mining," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 13/860, Ghent University, Faculty of Economics and Business Administration.
    2. D. Thorleuchter & D. Van Den Poel, 2012. "Protecting Research and Technology from Espionage," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 12/824, Ghent University, Faculty of Economics and Business Administration.
    3. D. Thorleuchter & D. Van Den Poel, 2012. "Technology Classification with Latent Semantic Indexing," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 12/814, Ghent University, Faculty of Economics and Business Administration.
    4. D. Thorleuchter & D. Van Den Poel & A. Prinzie, 2011. "Analyzing existing customers’ websites to improve the customer acquisition process as well as the profitability prediction in B-to-B marketing," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 11/733, Ghent University, Faculty of Economics and Business Administration.
    5. D. Thorleuchter & D. Van Den Poel, 2013. "Quantitative Cross Impact Analysis with Latent Semantic Indexing," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 13/861, Ghent University, Faculty of Economics and Business Administration.
    6. D. Thorleuchter & D. Van Den Poel, 2013. "Semantic Compared Cross Impact Analysis," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 13/862, Ghent University, Faculty of Economics and Business Administration.
    7. Sheng, Jie & Amankwah-Amoah, Joseph & Wang, Xiaojun, 2017. "A multidisciplinary perspective of big data in management research," International Journal of Production Economics, Elsevier, vol. 191(C), pages 97-112.
    8. Irina Wedel & Michael Palk & Stefan Voß, 2022. "A Bilingual Comparison of Sentiment and Topics for a Product Event on Twitter," Information Systems Frontiers, Springer, vol. 24(5), pages 1635-1646, October.
    9. Mohammed Salem Binwahlan, 2023. "Polynomial Networks Model for Arabic Text Summarization," International Journal of Research and Scientific Innovation, International Journal of Research and Scientific Innovation (IJRSI), vol. 10(2), pages 74-84, February.
    10. Haegeman, Karel & Marinelli, Elisabetta & Scapolo, Fabiana & Ricci, Andrea & Sokolov, Alexander, 2013. "Quantitative and qualitative approaches in Future-oriented Technology Analysis (FTA): From combination to integration?," Technological Forecasting and Social Change, Elsevier, vol. 80(3), pages 386-397.
    11. Curci, Ylenia & Mongeau Ospina, Christian A., 2016. "Investigating biofuels through network analysis," Energy Policy, Elsevier, vol. 97(C), pages 60-72.
    12. Chao Wei & Senlin Luo & Xincheng Ma & Hao Ren & Ji Zhang & Limin Pan, 2016. "Locally Embedding Autoencoders: A Semi-Supervised Manifold Learning Approach of Document Representation," PLOS ONE, Public Library of Science, vol. 11(1), pages 1-20, January.
    13. Maksym Polyakov & Morteza Chalak & Md. Sayed Iftekhar & Ram Pandit & Sorada Tapsuwan & Fan Zhang & Chunbo Ma, 2018. "Authorship, Collaboration, Topics, and Research Gaps in Environmental and Resource Economics 1991–2015," Environmental & Resource Economics, Springer;European Association of Environmental and Resource Economists, vol. 71(1), pages 217-239, September.
    14. Ding, Ying, 2011. "Community detection: Topological vs. topical," Journal of Informetrics, Elsevier, vol. 5(4), pages 498-514.
    15. Klaus Gugler & Florian Szücs & Ulrich Wohak, 2023. "Start-up Acquisitions, Venture Capital and Innovation: A Comparative Study of Google, Apple, Facebook, Amazon and Microsoft," Department of Economics Working Papers wuwp340, Vienna University of Economics and Business, Department of Economics.
    16. Md Nazrul Islam & Md Mofazzal Hossain & Md Shafayet Shahed Ornob, 2024. "Business research on Industry 4.0: a systematic review using topic modelling approach," Future Business Journal, Springer, vol. 10(1), pages 1-15, December.
    17. Juan Shi & Kin Keung Lai & Ping Hu & Gang Chen, 2018. "Factors dominating individual information disseminating behavior on social networking sites," Information Technology and Management, Springer, vol. 19(2), pages 121-139, June.
    18. Ganesh Dash & Chetan Sharma & Shamneesh Sharma, 2023. "Sustainable Marketing and the Role of Social Media: An Experimental Study Using Natural Language Processing (NLP)," Sustainability, MDPI, vol. 15(6), pages 1-16, March.
    19. Paola Cerchiello & Giancarlo Nicola, 2018. "Assessing News Contagion in Finance," Econometrics, MDPI, vol. 6(1), pages 1-19, February.
    20. Shr-Wei Kao & Pin Luarn, 2020. "Topic Modeling Analysis of Social Enterprises: Twitter Evidence," Sustainability, MDPI, vol. 12(8), pages 1-20, April.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:rug:rugwps:12/811. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Nathalie Verhaeghe (email available below). General contact details of provider: https://edirc.repec.org/data/ferugbe.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.