{"id":"https://openalex.org/W315494487","doi":"https://doi.org/10.1007/1-4020-7901-x_6","title":"A Learning-based Approach to Information Release Control","display_name":"A Learning-based Approach to Information Release Control","publication_year":2005,"publication_date":"2005-12-21","ids":{"openalex":"https://openalex.org/W315494487","doi":"https://doi.org/10.1007/1-4020-7901-x_6","mag":"315494487"},"language":"en","primary_location":{"id":"doi:10.1007/1-4020-7901-x_6","is_oa":true,"landing_page_url":"https://doi.org/10.1007/1-4020-7901-x_6","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F1-4020-7901-X_6.pdf","source":{"id":"https://openalex.org/S4306463519","display_name":"Kluwer Academic Publishers eBooks","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"ebook platform"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP International Federation for Information Processing","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://link.springer.com/content/pdf/10.1007%2F1-4020-7901-X_6.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010533347","display_name":"Cl\u00e1udio Bettini","orcid":"https://orcid.org/0000-0002-1727-7650"},"institutions":[{"id":"https://openalex.org/I189158943","display_name":"University of Milan","ror":"https://ror.org/00wjc7c48","country_code":"IT","type":"education","lineage":["https://openalex.org/I189158943"]},{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["IT","US"],"is_corresponding":true,"raw_author_name":"Claudio Bettini","raw_affiliation_strings":["Center for Secure Information Systems, George Mason University","DICO, University of Milan, Italy","George Mason University","DICO, University of Milan"],"affiliations":[{"raw_affiliation_string":"Center for Secure Information Systems, George Mason University","institution_ids":["https://openalex.org/I162714631"]},{"raw_affiliation_string":"DICO, University of Milan, Italy","institution_ids":["https://openalex.org/I189158943"]},{"raw_affiliation_string":"George Mason University","institution_ids":["https://openalex.org/I162714631"]},{"raw_affiliation_string":"DICO, University of Milan","institution_ids":["https://openalex.org/I189158943"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109849797","display_name":"X. Sean Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]},{"id":"https://openalex.org/I111236770","display_name":"University of Vermont","ror":"https://ror.org/0155zta11","country_code":"US","type":"education","lineage":["https://openalex.org/I111236770"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"X. Sean Wang","raw_affiliation_strings":["Center for Secure Information Systems, George Mason University","Department of Computer Science, University of Vermont","University of Vermont","George Mason University"],"affiliations":[{"raw_affiliation_string":"Center for Secure Information Systems, George Mason University","institution_ids":["https://openalex.org/I162714631"]},{"raw_affiliation_string":"Department of Computer Science, University of Vermont","institution_ids":["https://openalex.org/I111236770"]},{"raw_affiliation_string":"University of Vermont","institution_ids":["https://openalex.org/I111236770"]},{"raw_affiliation_string":"George Mason University","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010727123","display_name":"Sushil Jajodia","orcid":"https://orcid.org/0000-0003-3210-558X"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sushil Jajodia","raw_affiliation_strings":["Center for Secure Information Systems, George Mason University","George Mason University"],"affiliations":[{"raw_affiliation_string":"Center for Secure Information Systems, George Mason University","institution_ids":["https://openalex.org/I162714631"]},{"raw_affiliation_string":"George Mason University","institution_ids":["https://openalex.org/I162714631"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5010533347"],"corresponding_institution_ids":["https://openalex.org/I162714631","https://openalex.org/I189158943"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.05095876,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"83","last_page":"105"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.675734281539917},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.649366021156311},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.645902693271637},{"id":"https://openalex.org/keywords/insider","display_name":"Insider","score":0.6339079141616821},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5121734142303467},{"id":"https://openalex.org/keywords/information-flow","display_name":"Information flow","score":0.4881320893764496},{"id":"https://openalex.org/keywords/discretionary-access-control","display_name":"Discretionary access control","score":0.48036083579063416},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.4377847909927368},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.228862464427948}],"concepts":[{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.675734281539917},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.649366021156311},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.645902693271637},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.6339079141616821},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5121734142303467},{"id":"https://openalex.org/C2779136372","wikidata":"https://www.wikidata.org/wiki/Q10283002","display_name":"Information flow","level":2,"score":0.4881320893764496},{"id":"https://openalex.org/C48814466","wikidata":"https://www.wikidata.org/wiki/Q1228590","display_name":"Discretionary access control","level":4,"score":0.48036083579063416},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.4377847909927368},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.228862464427948},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1007/1-4020-7901-x_6","is_oa":true,"landing_page_url":"https://doi.org/10.1007/1-4020-7901-x_6","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F1-4020-7901-X_6.pdf","source":{"id":"https://openalex.org/S4306463519","display_name":"Kluwer Academic Publishers eBooks","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"ebook platform"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP International Federation for Information Processing","raw_type":"book-chapter"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.106.1858","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.106.1858","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://homes.dico.unimi.it/~bettini/papers/iicis.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.2.5363","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.5363","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.uvm.edu/~xywang/publications/ifip11503.pdf","raw_type":"text"},{"id":"pmh:oai:zenodo.org:205156","is_oa":true,"landing_page_url":"https://www.openaccessrepository.it/record/205156","pdf_url":null,"source":{"id":"https://openalex.org/S4306402478","display_name":"INFM-OAR (INFN Catania)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210116497","host_organization_name":"Istituto Nazionale di Fisica Nucleare, Sezione di Catania","host_organization_lineage":["https://openalex.org/I4210116497"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/bookPart"},{"id":"doi:10.5281/zenodo.205156","is_oa":true,"landing_page_url":"https://doi.org/10.5281/zenodo.205156","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"graphic"}],"best_oa_location":{"id":"doi:10.1007/1-4020-7901-x_6","is_oa":true,"landing_page_url":"https://doi.org/10.1007/1-4020-7901-x_6","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F1-4020-7901-X_6.pdf","source":{"id":"https://openalex.org/S4306463519","display_name":"Kluwer Academic Publishers eBooks","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"ebook platform"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP International Federation for Information Processing","raw_type":"book-chapter"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.75,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G2498382824","display_name":"CAREER:   Towards Database Support for On-Line Time Series Analysis","funder_award_id":"9875114","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320313475","display_name":"Universit\u00e0 degli Studi di Milano","ror":"https://ror.org/00wjc7c48"},{"id":"https://openalex.org/F4320321873","display_name":"Ministero dell\u2019Istruzione, dell\u2019Universit\u00e0 e della Ricerca","ror":"https://ror.org/0166hxq48"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W315494487.pdf","grobid_xml":"https://content.openalex.org/works/W315494487.grobid-xml"},"referenced_works_count":22,"referenced_works":["https://openalex.org/W1521274165","https://openalex.org/W1563088657","https://openalex.org/W1568970441","https://openalex.org/W1608148813","https://openalex.org/W1749554492","https://openalex.org/W1791396942","https://openalex.org/W1971220772","https://openalex.org/W1971405342","https://openalex.org/W1991722481","https://openalex.org/W2003233718","https://openalex.org/W2012419258","https://openalex.org/W2067580069","https://openalex.org/W2076826528","https://openalex.org/W2106365165","https://openalex.org/W2118020653","https://openalex.org/W2118828104","https://openalex.org/W2132461362","https://openalex.org/W2135499008","https://openalex.org/W2171177618","https://openalex.org/W4232534713","https://openalex.org/W4241141672","https://openalex.org/W4250963083"],"related_works":["https://openalex.org/W2148952798","https://openalex.org/W2382286253","https://openalex.org/W2387530238","https://openalex.org/W3138978413","https://openalex.org/W2947088123","https://openalex.org/W1503896993","https://openalex.org/W2358662376","https://openalex.org/W1993439489","https://openalex.org/W1596015467","https://openalex.org/W2389642126"],"abstract_inverted_index":{"Controlled":[0],"release":[1,98,129,141,157,162,181,199,223],"of":[2,56,118,127,137,155],"information":[3,15,57,69,113,119],"from":[4,10,43,147,184],"an":[5,124],"organization":[6],"is":[7,27,63,74,100,159],"becoming":[8],"important":[9],"various":[11],"considerations:":[12],"privacy,":[13],"competitive":[14],"protection,":[16],"strategic":[17],"data":[18,25,171],"control,":[19,33,106],"and":[20,107,173,207],"more.":[21],"In":[22,167],"most":[23,152],"organizations,":[24],"protection":[26],"afforded":[28],"only":[29],"by":[30,95,187],"using":[31],"access":[32,40,50,60,72,84,105],"However,":[34],"it":[35],"can":[36,59],"be":[37],"argued":[38],"that":[39,150],"control":[41,51,73,99,130,142,158,163,182,200,224],"suffers":[42],"at":[44,109,115],"least":[45],"two":[46],"problems.":[47],"First,":[48],"effective":[49,76,156],"assumes":[52],"a":[53,67,128,168,215],"perfect":[54],"categorization":[55],"(\u201cwho":[58],"what\u201d),":[61],"which":[62],"increasingly":[64],"difficult":[65,153],"in":[66],"complex":[68],"system.":[70,131],"Second,":[71],"not":[75],"against":[77],"insider":[78],"attacks,":[79],"where":[80],"users":[81],"whith":[82],"legitimate":[83],"rights":[85],"send":[86],"out":[87],"sensitive":[88],"information,":[89],"either":[90],"with":[91],"malicious":[92],"intent":[93],"or":[94],"accident.":[96],"Information":[97],"viewed":[101],"as":[102],"complementary":[103],"to":[104,179,196,202,220],"aims":[108],"restricting":[110],"the":[111,116,135,148,151,161,188,198],"outgoing":[112],"flow":[114],"boundary":[117],"systems.":[120],"This":[121,144,211],"paper":[122,212],"presents":[123],"architectural":[125],"view":[126],"The":[132,191],"system":[133,192],"emphasizes":[134],"role":[136],"automated":[138],"learning":[139,175,195],"for":[140],"constraints.":[143,225],"has":[145],"resulted":[146],"realization":[149],"task":[154],"how":[160,219],"constraints":[164,183,201],"are":[165,177],"specified.":[166],"learning-based":[169],"system,":[170],"mining":[172],"machine":[174],"techniques":[176],"employed":[178],"generate":[180],"samples":[185],"provided":[186],"security":[189],"officer.":[190],"applies":[193],"continuous":[194],"adjust":[197],"reduce":[203],"both":[204],"mistakenly":[205,208],"released":[206],"restricted":[209],"documents.":[210],"also":[213],"provides":[214],"specific":[216],"example":[217],"on":[218],"learn":[221],"keyword-based":[222]},"counts_by_year":[],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
