Protecting Research and Technology from Espionage

Fraunhofer INT

Application

In recent years, governmental and industrial espionage becomes an increased problem for governments and corporations. Especially information about current technology development and research activities are interesting targets for espionage.

Problem: It is often time and cost consuming to identify sensible knowledge within the company and to prevent information leakage.

Solution: We introduce a new and automated text- and web mining based methodology that investigates the information leakage risk of technological knowledge processed by an organization concerning governmental or industrial espionage. Further, we also provide a text classification based multilevel security (MLS) approach that is specifically created to protect information from unauthorized access.

Case Study

Approaches and case studies are published in

Thorleuchter, D., Van den Poel, D.: Protecting Research and Technology from Espionage. Expert Systems with Applications 40 (9) 2013, 3432-3440.

Thorleuchter, D., Van den Poel, D.: Improved Multilevel Security with Latent Semantic Indexing. Expert Systems with Applications 39 (18) 2012, 13462-13471.

Thorleuchter, D., Weck, G., Van den Poel, D.: Granular Deleting in Multi Level Security Models - an Electronic Engineering approach. Lecture Notes in Electrical Engineering, 1, 177, Springer, Berlin, pp. 609-614, 2012.

Thorleuchter, D., Weck, G., Van den Poel, D. (2012b). Usability based Modeling for Advanced IT-Security - an Electronic Engineering approach. Lecture Notes in Electrical Engineering, 1, 177, Springer, Berlin, pp. 615-619, 2012.

Thorleuchter, D., Van den Poel, D.: High Granular Multi-Level-Security Model for Improved Usability. In: System Science, Engineering Design and Manufacturing Informatization 1, IEEE Press, pp.191-194, 2011.

Thorleuchter, D., Gericke, W., Weck, G., Reiländer, F., Loß, D: Vertrauliche Verarbeitung staatlich eingestufter Information - die Informationstechnologie im Geheimschutz. Informatik-Spektrum 32 (2009), Nr. 2, pp. 102-109.

Contact us if you would like to protect your company from espionage.