AN AUTOMATED DIALOG SYSTEM FOR CONDUCTING SECURITY INTERVIEWS FOR ACCESS CONTROL

被引:0
|
作者
Ababneh, Mohammad
Athamnah, Malek
Wijesekera, Duminda
Costa, Paulo
机构
来源
关键词
Automated dialog system; security interviews; border control;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Visa, border entry and security clearance interviews are critical homeland security activities that provide access privileges to the geographical United States or to classified information. The person conducting such an interview may not be an expert in the subject area or could be deceived by a manipulative interviewee, resulting in negative security consequences. This paper demonstrates how an interactive voice response system can be used to generate context-sensitive, yet randomized, dialogs that provide confidence in the trustworthiness of an interviewee based on his/her ability to answer questions. The system uses contextual reasoning and ontological inference to derive new facts dynamically. Item response theory is employed to create relevant questions based on social, environmental, relational and historical attributes related to interviewees who seek access to controlled areas or sensitive information.
引用
收藏
页码:111 / 125
页数:15
相关论文
共 50 条
  • [41] OMASES - Open market access and security assessment system: An approach to preventive dynamic security assessment and control
    Massucco, S
    Pavella, M
    2002 IEEE POWER ENGINEERING SOCIETY SUMMER MEETING, VOLS 1-3, CONFERENCE PROCEEDINGS, 2002, : 1407 - 1409
  • [42] Automated decomposition of access control policies
    Su, LY
    Chadwick, DW
    Basden, A
    Cunningham, JA
    SIXTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, : 3 - 13
  • [43] DIALOG IN THE AUTOMATED INFORMATION-RETREIVAL SYSTEM OF PATENT DOCUMENTATION
    GENIN, BL
    BRODINSKII, MD
    VAISBERG, AM
    NAUCHNO-TEKHNICHESKAYA INFORMATSIYA SERIYA 2-INFORMATSIONNYE PROTSESSY I SISTEMY, 1987, (05): : 15 - 18
  • [44] On the Security of Delegation in Access Control Systems
    Wang, Qihua
    Li, Ninghui
    Chen, Hong
    COMPUTER SECURITY - ESORIC 2008, PROCEEDINGS, 2008, 5283 : 317 - 332
  • [45] PLC Access Control: A Security Analysis
    Wardak, Haroon
    Zhioua, Sami
    Almulhem, Ahmad
    2016 WORLD CONGRESS ON INDUSTRIAL CONTROL SYSTEMS SECURITY (WCICSS), 2016, : 56 - 61
  • [46] Security Fault Tolerance for Access Control
    Jang, Dongsoo
    Shin, Michael
    Pathirage, Don
    2020 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING AND SELF-ORGANIZING SYSTEMS COMPANION (ACSOS-C 2020), 2020, : 212 - 217
  • [47] ACCESS CONTROL REQUIREMENTS FOR PRIVACY AND SECURITY
    KINGSLAKE, R
    INFORMATION PRIVACY, 1979, 1 (07): : 312 - 314
  • [48] LATTICE STRUCTURE OF DATA IN THE DIALOG SYSTEM FOR SOFTWARE AUTOMATED DESIGN
    DODONOV, SB
    DOPOVIDI AKADEMII NAUK UKRAINSKOI RSR SERIYA A-FIZIKO-MATEMATICHNI TA TECHNICHNI NAUKI, 1983, (05): : 66 - 69
  • [49] DIALOG INFORMATION-SYSTEM ON AUTOMATED DESIGN OF CONSTRUCTION DETAILS
    TKACHENKO, LN
    GERASIMOV, BY
    NAUCHNO-TEKHNICHESKAYA INFORMATSIYA SERIYA 1-ORGANIZATSIYA I METODIKA INFORMATSIONNOI RABOTY, 1987, (02): : 11 - 14
  • [50] Security Access Control Research Trends
    Fathy, Mohamed
    Azer, Marianne
    Bahgat, Moustapha
    Yehia, Ayman
    2013 6TH JOINT IFIP WIRELESS AND MOBILE NETWORKING CONFERENCE (WMNC 2013), 2013,