Contextual word recognition using probabilistic relaxation labeling
Pattern Recognition
A Survey of Methods and Strategies in Character Segmentation
IEEE Transactions on Pattern Analysis and Machine Intelligence
X Window system: core and extension protocols
X Window system: core and extension protocols
UIML: an appliance-independent XML user interface language
WWW '99 Proceedings of the eighth international conference on World Wide Web
Aspect-oriented programming: Introduction
Communications of the ACM
R-trees: a dynamic index structure for spatial searching
SIGMOD '84 Proceedings of the 1984 ACM SIGMOD international conference on Management of data
Preserving Privacy in Environments with Location-Based Applications
IEEE Pervasive Computing
An XML-Based Runtime User Interface Description Language for Mobile Computing Devices
DSV-IS '01 Proceedings of the 8th International Workshop on Interactive Systems: Design, Specification, and Verification-Revised Papers
The eXtensible Rule Markup Language
Communications of the ACM - Wireless networking security
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Web Privacy with P3p
Protecting privacy in tabular healthcare data: explicit uncertainty for disclosure control
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Source Code Analysis: A Road Map
FOSE '07 2007 Future of Software Engineering
Hi-index | 0.00 |
Industry coalitions are developing regulations to govern information sharing and to protect sensitive business data and the privacy of individuals. In many cases, these regulations make it impossible to outsource business operations, unless the companies have effective technologies to protect sensitive information. This paper addresses scenarios in which data servers and applications are owned and maintained on the premises of a company, and the service providers remotely access the data and the applications. We present a unique solution called Masking Gateway for Enterprises (MAGEN) that masks sensitive information appearing on application displays, without any interference with the applications that generate those screens. The major novelty lies in the utilization of optical character recognition (OCR) for analyzing and understanding application screens. Together with a comprehensive rule language, this approach makes it possible to characterize fields containing sensitive information and mask them according to predefined rules. The rule language is very flexible, abstract, and intuitive and is designed to cope with a vast set of policies and security needs. We describe the major challenges in implementing MAGEN and the results of experimenting with it in situations that occur in actual business settings. We outline techniques that optimize the OCR process to minimize latency and ensure robust operation.