2017
DOI: 10.1109/mcom.2017.1700235
|View full text |Cite
|
Sign up to set email alerts
|

Data Leakage Prevention for Secure Cross-Domain Information Exchange

Abstract: Abstract-Cross-domain information exchange is an increasingly important capability for conducting efficient and secure operations, both within coalitions and within single nations. A data guard is a common cross-domain sharing solution that inspects and validates that the security labels of exported data objects are such that they can be released according to policy. While we see that guard solutions can be implemented with high assurance, we find that obtaining an equivalent level of assurance in the correctn… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…First, n-gram frequencies were generated. N-gram refers to a contiguous sequence of n words from a given sequence of text (Kongsgard, Nordbotten, Mancini, Haakseth, & Engelstad, 2017). N-gram language models are widely used in Natural Language Processing (NLP), such as speech recognition, machine translation, and information retrieval (Dang et al, 2016).…”
Section: Automated Text Classificationmentioning
confidence: 99%
“…First, n-gram frequencies were generated. N-gram refers to a contiguous sequence of n words from a given sequence of text (Kongsgard, Nordbotten, Mancini, Haakseth, & Engelstad, 2017). N-gram language models are widely used in Natural Language Processing (NLP), such as speech recognition, machine translation, and information retrieval (Dang et al, 2016).…”
Section: Automated Text Classificationmentioning
confidence: 99%
“…As mentioned earlier, labeling is not in itself enough in a cross-domain environment; we, however, need guards which implement the policy of an organization, a mission etc; deciding which participants can send messages and which class etc. For example, Kongsgård et al [4] build data-driven methods for guards which infer the words associated with classified content. Then when using "wrong" words in too low classes, an alarm is given.…”
Section: Data Labeling and Xmpp A Data Labelingmentioning
confidence: 99%