Skip to main content

An Innovative Framework for Securing Unstructured Documents

  • Conference paper
Computational Intelligence in Security for Information Systems

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6694))

  • 1459 Accesses

Abstract

The coexistence of both structured and unstructured data represents a huge limitation for documents management in public and private contexts. In order to identify and protect specific resources within monolithic documents we have exploited the adoption of different techniques aiming to analyze texts and automatically extract relevant information. In this paper we propose an innovative framework for data transformation that is based on a semantic approach and can be adapted in many different contexts; in particular, we will illustrate the applicability of such a framework for the formalization and protection of e-health medical records.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Yang, Y., Webb, G.I.: Discretization for naive-Bayes learning: managing discretization bias and variance. In: Machine Learning, vol. 74(1), pp. 39–74. Springer, Heidelberg (2009)

    Google Scholar 

  2. Safavian, S.R., Landgrebe, D.: A survey of decision tree classifier methodology. IEEE Transactions on Systems, Man and Cybernetics 21(3), 660–674 (2002)

    Article  MathSciNet  Google Scholar 

  3. Kim, B.S., Park, S.B.: A Fast k Nearest Neighbor Finding Algorithm Based on the Ordered Partition. IEEE Transactions on Pattern Analysis and Machine Intelligence, 761–766 (2009)

    Google Scholar 

  4. Dagan, I., Termight, C.K.: Identifying and translating technical terminology. In: Proceedings of the fourth conference on applied natural language processing, pp. 34–40. Morgan Kaufmann Publishers Inc., San Francisco (1994)

    Chapter  Google Scholar 

  5. Manning, C., Schtze, H.: Foundations of Statistical Natural Language Processing. MIT Press, Cambridge (1999)

    Google Scholar 

  6. Amato, F., Casola, V., Mazzeo, A., Romano, S.: A semantic based methodology to classify and protect sensitive data in medical records. In: IEEE Proc. of IAS 2010, Atlanta, USA, pp. 240–246 (2010)

    Google Scholar 

  7. Amato, F., Casola, V., Mazzocca, N., Romano, S.: A semantic-based document processing framework: a security perspective. Accepted in: Complex, Intelligent, and Software Intensive Systems 2011, Seoul, Korea (June 2011)

    Google Scholar 

  8. The Medical Subject Headings comprise the National Library of Medicine’s www.nlm.nih.gov/mesh/

  9. Berthold, M.R., Cebron, N., Dill, F., Di Fatta, G., Gabriel, T.R., Georg, F., Meinl, T., Ohl, P.: KNIME: The Konstanz Information Miner. In: Proceedings of the 4th Annual Industrial Simulation Conference, Workshop on Multi-agent Systems and Simulations, Palermo (2006)

    Google Scholar 

  10. HL7 CDA Release 2.0 2005. The HL7 Version 3 Standard: Clinical Data Architecture, Release 2.0, ANSI Standard

    Google Scholar 

  11. Bolasco, S.: Statistica testuale e text mining: alcuni paradigmi applicativi, Quaderni di Statistica, Liguori Ed., 7, p. 17-53 (2005)

    Google Scholar 

  12. The OASIS technical commitee: Xacml: extensible access control markup language (2005), http://www.oasisopen.org/committees/xacml/repository/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Amato, F., Casola, V., Mazzeo, A., Romano, S. (2011). An Innovative Framework for Securing Unstructured Documents. In: Herrero, Á., Corchado, E. (eds) Computational Intelligence in Security for Information Systems. Lecture Notes in Computer Science, vol 6694. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21323-6_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-21323-6_32

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-21322-9

  • Online ISBN: 978-3-642-21323-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics