skip to main content
10.1145/1999676.1999721acmconferencesArticle/Chapter ViewAbstractPublication Pagesk-capConference Proceedingsconference-collections
demonstration

Eliciting domain expert misuseability conceptions

Published: 26 June 2011 Publication History

Abstract

In previous work we proposed the M-score measure for assigning a misuseability (i.e., sensitivity) score to data records. The M-score uses sensitivity score functions that should be acquired from domain experts. In this paper we present two different approaches for acquiring the required knowledge. In the first method the expert is asked to explicitly assign a sensitivity score to displayed records. The second method employs pairwise comparison approach. A field study indicates that the later method is preferable.

References

[1]
Harel, A., et al. M-score: estimating the potential dam-age of data leakage incident by assigning misuseability weight. In Proc. of the 2010 ACM workshop on Insider threats (WIT '10), NY, USA, 2010.
[2]
Harel, A., et al. Dynamic Sensitivity-Based Access Control. In Proc. of the 2011 IEEE Intelligence and Security Informatics (IEEE ISI '11), Beijing, 2011.
[3]
Kamra, A., et al. Detecting Anomalous Access Patterns in Relational Databases. International Journal on Very Large Databases, 17(5):1063--1077, 2008.
[4]
Lapata, M. Automatic evaluation of information ordering: Kendall's tau. Computational Linguistics, 32(4):471--484. December 2006.
[5]
Mathew, S., et al. A Data-Centric Approach to Insider Attack Detection in Database Systems. In Proc. of the 13th International Symposium on Recent Advances in Intrusion Detection (RAID '10), Berlin 2010.
[6]
Yaseen, Q., and Panda, B. Knowledge Acquisition and Insider Threat Prediction in Relational Database Sys-tems. International Conference on Computational Science and Engineering (CSE '09), Canada, 2009.

Cited By

View all
  • (2011)Dynamic Sensitivity-Based Access ControlProceedings of 2011 IEEE International Conference on Intelligence and Security Informatics10.1109/ISI.2011.5984080(201-203)Online publication date: Jul-2011

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
K-CAP '11: Proceedings of the sixth international conference on Knowledge capture
June 2011
212 pages
ISBN:9781450303965
DOI:10.1145/1999676

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 June 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. m-score
  2. misuseability weight
  3. sensitivity score function

Qualifiers

  • Demonstration

Conference

K-CAP '2011
Sponsor:
K-CAP '2011: Knowledge Capture Conference
June 26 - 29, 2011
Alberta, Banff, Canada

Acceptance Rates

Overall Acceptance Rate 55 of 198 submissions, 28%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2011)Dynamic Sensitivity-Based Access ControlProceedings of 2011 IEEE International Conference on Intelligence and Security Informatics10.1109/ISI.2011.5984080(201-203)Online publication date: Jul-2011

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media