A comment on the `basic security theorem' of Bell and LaPadula
Information Processing Letters
Term-weighting approaches in automatic text retrieval
Information Processing and Management: an International Journal
Implementing multilevel security by violation privilege
Computers and Security
Access control policies:some unanswered questions
Computers and Security
Communications of the ACM
Automatic structuring and retrieval of large text files
Communications of the ACM
On the validity of the Bell-LaPadula model
Computers and Security
A theory of term weighting based on exploratory data analysis
Proceedings of the 21st annual international ACM SIGIR conference on Research and development in information retrieval
Logistic Regression Using the SAS System: Theory and Application
Logistic Regression Using the SAS System: Theory and Application
Proving multilevel security of a system design
SOSP '77 Proceedings of the sixth ACM symposium on Operating systems principles
Managing role relationships in an information flow control model
Journal of Systems and Software
Access control in collaborative commerce
Decision Support Systems
Mediating secure information flow policies
Information and Computation
Detection of unknown computer worms based on behavioral classification of the host
Computational Statistics & Data Analysis
Text classification from unlabeled documents with bootstrapping and feature projection techniques
Information Processing and Management: an International Journal
Mining changes in customer behavior in retail marketing
Expert Systems with Applications: An International Journal
Extracting Consumers Needs for New Products - A Web Mining Approach
WKDD '10 Proceedings of the 2010 Third International Conference on Knowledge Discovery and Data Mining
Mining ideas from textual information
Expert Systems with Applications: An International Journal
A semantic term weighting scheme for text categorization
Expert Systems with Applications: An International Journal
Expert Systems with Applications: An International Journal
A survey of security in multi-agent systems
Expert Systems with Applications: An International Journal
Topics modeling based on selective Zipf distribution
Expert Systems with Applications: An International Journal
Expert Systems with Applications: An International Journal
Global data mining: An empirical study of current trends, future forecasts and technology diffusions
Expert Systems with Applications: An International Journal
Expert Systems with Applications: An International Journal
User-oriented ontology-based clustering of stored memories
Expert Systems with Applications: An International Journal
Using latent topics to enhance search and recommendation in Enterprise Social Software
Expert Systems with Applications: An International Journal
A literature review and classification of recommender systems research
Expert Systems with Applications: An International Journal
Modeling partial customer churn: On the value of first product-category purchase sequences
Expert Systems with Applications: An International Journal
Improving customer retention in financial services using kinship network information
Expert Systems with Applications: An International Journal
Clustering NGN user behavior for anomaly detection
Information Security Tech. Report
Including spatial interdependence in customer acquisition models: A cross-category comparison
Expert Systems with Applications: An International Journal
Predicting e-commerce company success by mining the text of its publicly-accessible website
Expert Systems with Applications: An International Journal
Technology classification with latent semantic indexing
Expert Systems with Applications: An International Journal
Protecting research and technology from espionage
Expert Systems with Applications: An International Journal
Web mining based extraction of problem solution ideas
Expert Systems with Applications: An International Journal
Weak signal identification with semantic web mining
Expert Systems with Applications: An International Journal
Quantitative cross impact analysis with latent semantic indexing
Expert Systems with Applications: An International Journal
Semantic compared cross impact analysis
Expert Systems with Applications: An International Journal
Hi-index | 12.06 |
Multilevel security (MLS) is specifically created to protect information from unauthorized access. In MLS, documents are assigned to a security label by a trusted subject e.g. an authorized user and based on this assignment; the access to documents is allowed or denied. Using a large number of security labels lead to a complex administration in MLS based operating systems. This is because the manual assignment of documents to a large number of security labels by an authorized user is time-consuming and error-prone. Thus in practice, most MLS based operating systems use a small number of security labels. However, information that is normally processed in an organization consists of different sensitivities and belongs to different compartments. To depict this information in MLS, a large number of security labels is necessary. The aim of this paper is to show that the use of latent semantic indexing is successful in assigning textual information to security labels. This supports the authorized user by his manual assignment. It reduces complexity by the administration of a MLS based operating system and it enables the use of a large number of security labels. In future, the findings probably will lead to an increased usage of these MLS based operating systems in organizations.