{"id":"https://openalex.org/W2528889424","doi":"https://doi.org/10.1109/ems.2015.13","title":"On the Usability of Clustering for Topic-Oriented Multi-level Security Models","display_name":"On the Usability of Clustering for Topic-Oriented Multi-level Security Models","publication_year":2015,"publication_date":"2015-10-01","ids":{"openalex":"https://openalex.org/W2528889424","doi":"https://doi.org/10.1109/ems.2015.13","mag":"2528889424"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/ems.2015.13","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090446312","display_name":"Paal Engelstad","orcid":"https://orcid.org/0009-0000-8371-927X"},"institutions":[],"countries":["NO"],"is_corresponding":true,"raw_author_name":"Paal E. Engelstad","raw_affiliation_strings":["Norwegian Defense Research Establishement (FFI), Akershus University College (RiOA), Oslo, Norway"],"affiliations":[{"raw_affiliation_string":"Norwegian Defense Research Establishement (FFI), Akershus University College (RiOA), Oslo, Norway","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":0,"corresponding_author_ids":["https://openalex.org/A5090446312"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":66},"biblio":{"volume":"28","issue":null,"first_page":"14","last_page":"20"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9923,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9923,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.9922,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9851,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/document-clustering","display_name":"Document Clustering","score":0.46783674},{"id":"https://openalex.org/keywords/hierarchical-clustering","display_name":"Hierarchical clustering","score":0.45666176},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security Policy","score":0.4209043}],"concepts":[{"id":"https://openalex.org/C500882744","wikidata":"https://www.wikidata.org/wiki/Q269236","display_name":"Latent Dirichlet allocation","level":3,"score":0.8502902},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.82268643},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8179984},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.6714647},{"id":"https://openalex.org/C171686336","wikidata":"https://www.wikidata.org/wiki/Q3532085","display_name":"Topic model","level":2,"score":0.66725564},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.63490105},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4920761},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.48119956},{"id":"https://openalex.org/C177937566","wikidata":"https://www.wikidata.org/wiki/Q4223102","display_name":"Document clustering","level":3,"score":0.46783674},{"id":"https://openalex.org/C92835128","wikidata":"https://www.wikidata.org/wiki/Q1277447","display_name":"Hierarchical clustering","level":3,"score":0.45666176},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.43615505},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.42962545},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.4209043},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4173072},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.41434193},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.24167076},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20518917},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.15939099},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/ems.2015.13","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","score":0.73,"id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":12,"referenced_works":["https://openalex.org/W1861893970","https://openalex.org/W1880262756","https://openalex.org/W1977556410","https://openalex.org/W1980617064","https://openalex.org/W2049017883","https://openalex.org/W2112050062","https://openalex.org/W241165861","https://openalex.org/W2506733745","https://openalex.org/W2619779390","https://openalex.org/W2749040653","https://openalex.org/W3123920865","https://openalex.org/W4302557251"],"related_works":["https://openalex.org/W4315588616","https://openalex.org/W4312773271","https://openalex.org/W4309228610","https://openalex.org/W4294597112","https://openalex.org/W3005513013","https://openalex.org/W2962686197","https://openalex.org/W2888805565","https://openalex.org/W2769501189","https://openalex.org/W2611137333","https://openalex.org/W2207653751"],"abstract_inverted_index":{"Security":[0],"levels":[1,14],"used":[2],"in":[3,45,62,148,199,209],"organizations":[4],"today":[5],"are":[6,43,60,124,160],"typically":[7],"course-grained,":[8],"broad":[9],"and":[10,18,41,94,112,117,172],"distinct,":[11],"using":[12,142,190],"security":[13,30,90,223],"such":[15],"as":[16,34],"\"Confidential\"":[17],"Secret\".":[19],"However,":[20],"current":[21],"research":[22],"is":[23,53],"advocating":[24],"a":[25,54,84,88],"move":[26],"towards":[27],"more":[28],"fine-grained":[29,65],"models,":[31],"e.g.":[32],"Such":[33],"Attribute-Based":[35],"Access":[36],"Control,":[37],"where":[38,57],"information":[39,58,115,153],"objects":[40,59],"end-users":[42],"characterized":[44,61],"terms":[46,63],"of":[47,64,67,70,114,141,157,180,189,220],"complex":[48],"meta-data.":[49],"One":[50],"idea":[51],"promoted":[52],"topic-oriented":[55,221],"approach":[56],"descriptions":[66],"the":[68,110,118,134,139,150,178,187,217],"topics":[69,93,111,122,151],"its":[71],"content.":[72],"It":[73],"will":[74,80,101],"lead":[75],"to":[76,86,92,97,132,145],"higher":[77],"flexibility,":[78],"but":[79],"also":[81,102],"rely":[82],"on":[83,186],"policy-database":[85],"assign":[87],"specific":[89],"policy":[91],"subtopics.":[95],"Due":[96],"increased":[98],"complexity,":[99],"it":[100],"require":[103],"automatic":[104],"or":[105],"semi-automatic":[106],"tools":[107,119],"for":[108,192],"determining":[109],"sub-topics":[113],"objects,":[116],"should":[120],"extract":[121],"that":[123],"easily":[125],"understood":[126],"by":[127],"humans,":[128],"since":[129],"humans":[130,147],"need":[131],"control":[133],"policy.":[135],"This":[136],"paper":[137],"studies":[138],"feasibility":[140,188],"clustering":[143,158,191,208],"techniques":[144],"help":[146],"extracting":[149],"from":[152],"objects.":[154],"A":[155],"number":[156],"methods":[159],"discussed,":[161],"including":[162],"k-means,":[163],"Ward's":[164],"hierarchical":[165],"agglomerative":[166],"clustering,":[167],"Correlated":[168],"Topic":[169],"Models":[170],"(CTM)":[171],"Latent":[173],"Dirichlet":[174],"Allocation":[175],"(LDA).":[176],"To":[177],"best":[179],"our":[181],"knowledge,":[182],"an":[183],"in-depth":[184],"analysis":[185,203],"this":[193],"problem":[194],"has":[195],"not":[196],"been":[197],"presented":[198],"previous":[200],"work.":[201],"Our":[202],"points":[204],"out":[205],"challenges":[206],"with":[207],"particular,":[210],"which":[211],"must":[212],"be":[213],"addressed":[214],"before":[215],"realizing":[216],"general":[218],"vision":[219],"policy-driven":[222],"models.":[224]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2528889424","counts_by_year":[],"updated_date":"2024-12-14T09:47:23.893403","created_date":"2016-10-14"}