Detection of Unspecified Emergencies for Controlled Information Sharing

During emergency situations one of the key requirements to handle the crisis is information sharing among organizations involved in the emergency management. When emergency situations are well known, it is possible to specify a priori these situations and to plan the information sharing needs in advance. However, there are many situations where it is not possible to describe these emergencies and their information sharing requirements beforehand. Therefore, in this paper, we present a framework able to deal with both specified and unspecified emergencies. The idea is to detect unspecified emergencies and related information sharing needs through denied access request analysis, anomaly detection techniques, and analysis of the history of permitted access requests. Besides presenting the techniques, the paper also presents experiments to verify their effectiveness.

[1]  Sushil Jajodia,et al.  Access control for smarter healthcare using policy spaces , 2010, Comput. Secur..

[2]  Felix Naumann,et al.  A Machine Learning Approach to Foreign Key Discovery , 2009, WebDB.

[3]  Ramaswamy Chandramouli,et al.  The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..

[4]  Ryan T. Wright,et al.  Social Media and Emergency Management: Exploring State and Local Tweets , 2014, 2014 47th Hawaii International Conference on System Sciences.

[5]  Hermann Hellwagner,et al.  Automatic sub-event detection in emergency management using social media , 2012, WWW.

[6]  Shahram Ebadollahi,et al.  Anomaly detection in information streams without prior domain knowledge , 2011, IBM J. Res. Dev..

[7]  Sandro Etalle,et al.  Audit-Based Access Control for Electronic Health Records , 2007, Electron. Notes Theor. Comput. Sci..

[8]  Achim D. Brucker,et al.  Attribute-Based Encryption with Break-Glass , 2010, WISTP.

[9]  David W. Chadwick,et al.  How to Break Access Control in a Controlled Manner , 2006, 19th IEEE Symposium on Computer-Based Medical Systems (CBMS'06).

[10]  Cristina Alcaraz,et al.  Towards Automatic Critical Infrastructure Protection through Machine Learning , 2013, CRITIS.

[11]  Eamonn J. Keogh,et al.  HOT SAX: efficiently finding the most unusual time series subsequence , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).

[12]  P. Manjula,et al.  A System for Timely and Controlled Information Sharing in Emergency Situations , 2014 .

[13]  Martha Palmer,et al.  Verb Semantics and Lexical Selection , 1994, ACL.

[14]  David W. Chadwick,et al.  How to Securely Break into RBAC: The BTG-RBAC Model , 2009, 2009 Annual Computer Security Applications Conference.

[15]  Hui Xiong,et al.  Secure information sharing and analysis for effective emergency management , 2008, DG.O.

[16]  Achim D. Brucker,et al.  Extending access control models with break-glass , 2009, SACMAT '09.

[17]  Lior Rokach,et al.  Detecting data misuse by applying context-based data linkage , 2010, Insider Threats '10.

[18]  Dave Yates,et al.  Emergency knowledge management and social media technologies: A case study of the 2010 Haitian earthquake , 2011, Int. J. Inf. Manag..

[19]  Barbara Carminati,et al.  Controlled information sharing for unspecified emergencies , 2013, 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS).

[20]  Felix Naumann,et al.  Efficiently Detecting Inclusion Dependencies , 2007, 2007 IEEE 23rd International Conference on Data Engineering.