Devil in the Details: Assessing Automated Confidentiality Classifiers in the Context of NATO Documents

نویسندگان

  • Marc Richter
  • Konrad Wrona
چکیده

Automating security classification of documents has a great potential to increase the efficiency of information management and security in IT systems used by governmental, military and international organizations. In particular, automated security classification can be used in support of cross-domain information exchange solutions, such as the NATO Information Clearing House. These solutions often require a manual review of documents flowing between different security domains and thus introduce a performance bottleneck. In this paper, we describe an automated confidentiality classification process that could offer an important support for the manual review of documents. It consists of providing an automated pre-labeling of documents, accompanied by an assessment of confidence levels concerning the identified labels. This would allow responsible personnel to focus on low-confidence cases and review other documents only to the extent required to provide an appropriate audit and security control. We evaluate performance of some of the freely available classification algorithms in the context of confidentiality classification of NATO documents and conclude that although these systems are not accurate enough to warrant a complete autonomous operations, they are effective enough to provide an important support for human operators.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Tension between Transparency and Confidentiality in International Arbitrations

The present research study intends to investigate the concepts of transparency, confidentiality and privacy within the scope of Investor-State Arbitration and International Commercial Arbitration.Transparency, confidentiality and privacy are the main pillars of international arbitration which have a close relationship together, however in some cases they are in a controversial situation. The te...

متن کامل

مقایسه‌ سطوح دسترسی و محرمانگی مدارک پزشکی در کشورهای منتخب و ایران

Introduction: Undoubtedly, the medical record is one of the most important documents containing the most sensitive information on the public health and treatment. As a matter of fact, protecting the confidentiality of the recorded information and the documents there in should be given top priority. Thus, given the importance of the confidentiality of medical document, and their impact on the be...

متن کامل

The Devil Is in the Details! On Regulating Cannabis Use in Canada Based on Public Health Criteria; Comment on “Legalizing and Regulating Marijuana in Canada: Review of Potential Economic, Social, and Health Impacts”

This commentary to the editorial of Hajizadeh argues that the economic, social and health consequences of legalizing cannabis in Canada will depend in large part on the exact stipulations (mainly from the federal government) and on the implementation, regulation and practice of the legalization act (on provincial and municipal levels). A strict regulatory framework is necessary to minimize the ...

متن کامل

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

A Method for Protecting Access Pattern in Outsourced Data

Protecting the information access pattern, which means preventing the disclosure of data and structural details of databases, is very important in working with data, especially in the cases of outsourced databases and databases with Internet access. The protection of the information access pattern indicates that mere data confidentiality is not sufficient and the privacy of queries and accesses...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017