2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems 2008
DOI: 10.1109/mahss.2008.4660114
|View full text |Cite
|
Sign up to set email alerts
|

Securing information flows: A metadata framework

Abstract: Recently, risk-based information trading has emerged as a new paradigm for securely sharing information across traditional organizational boundaries. In this paradigm, the risk of sharing information between organizations is characterized using expected losses (due, for example, to (un)intended information disclosure) and billed to a recipient. However, within risk-based information trading systems, quantifying the risks associated with sharing information is a non-trivial task, particularly when risk calculat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…There is a need of DLP solution that will allow secure sharing of confidential information in companies [34].…”
Section: A Results Based Approach For Data Leakage Prevention-this Appmentioning
confidence: 99%
See 1 more Smart Citation
“…There is a need of DLP solution that will allow secure sharing of confidential information in companies [34].…”
Section: A Results Based Approach For Data Leakage Prevention-this Appmentioning
confidence: 99%
“…Two algorithms are used to describe the system: Boyer Moore (BM Algorithm) [34] is used to search exact sensitive strings exposed to whitespace attack and Smith Waterman (SW) sequential alignment algorithm [35] is used to detect modified string attacks.…”
Section: A Turkish Language Based Data Leakage Preventionmentioning
confidence: 99%
“…There is a need of DLP solution that will allow secure sharing of confidential information in companies [17].…”
Section: A Results Based Approach For Data Leakage Prevention-this Appmentioning
confidence: 99%
“…Two algorithms are used to describe the system: Boyer Moore (BM Algorithm) [17] is used to search exact sensitive strings exposed to whitespace attack and Smith Waterman (SW) sequential alignment algorithm [18] is used to detect modified string attacks.…”
Section: A Turkish Language Based Data Leakage Preventionmentioning
confidence: 99%
“…In [5,14,22,23], while risk is estimated based on the object metadata [24], the actual formulas or examples use static credentials (e.g., the security clearance or category set) of the shared object and the recipient, rather than a dynamic value of the shared object. Further, they do not provide solutions to either deduce the metadata or estimate the value of new or derived objects.…”
Section: Secure Information Flowsmentioning
confidence: 99%