Amir Harel's research while affiliated with Ben-Gurion University of the Negev and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (4)
Detecting and preventing data leakage and data misuse poses a serious challenge for organizations, especially when dealing with insiders with legitimate permissions to access the organization's systems and its critical data. In this paper, we present a new concept, Misuseability Weight, for estimating the risk emanating from data exposed to insider...
In this paper we propose a new access control mechanism, Dynamic Sensitivity-Based Access Control (DSBAC), designed to regulate users' access to sensitive data stored in relational databases. The DSBAC is an extension of the basic mandatory access control (MAC) mechanism, and it uses the M-score (Misuseability score) measure in order to assign, dyn...
In previous work we proposed the M-score measure for assigning a misuseability (i.e., sensitivity) score to data records. The M-score uses sensitivity score functions that should be acquired from domain experts. In this paper we present two different approaches for acquiring the required knowledge. In the first method the expert is asked to explici...
Over the past few years data leakage and data misuse have become a major concern for organizations. A data leakage or data misuse incident can damage an organization's reputation and brand name as well as compromise the privacy of its customers. Much research has been conducted in order to find a solution to these threats. Most methods are based on...
Citations
... the user usage details need to be monitored for checking on misuse of data. The author [6,13] present a model where the risk imposed by an user can be estimated. For multi user environment, user specific attributes are to be considered for fine grained access control. ...
... To predict soil moisture at the tensions of 0 and 6 kPa, the variables total porosity and microporosity were not used in sets A3 and A4 due to the dataleakage effect that happens when the models use information from the variable to be estimated, which may result in an overfit (Harel et al., 2010). ...
... Using this infonnation, the organization can then take appropriate steps to prevent this damage or to minimize its impact. In [7] we show that the M-score fulfill its goal of assigning a sensitivity score to tables of data that is not only accurately but also consistent with domain expert intentions. ...
Reference: Dynamic Sensitivity-Based Access Control