Taking advantages of a disadvantage: Digital forensics and steganography using document metadata
Journal of Systems and Software
Adaptive real-time anomaly detection with incremental clustering
Information Security Tech. Report
Sanitization models and their limitations
NSPW '06 Proceedings of the 2006 workshop on New security paradigms
Editorial: Some issues in privacy data management
Data & Knowledge Engineering
Protecting business intelligence and customer privacy while outsourcing data mining tasks
Knowledge and Information Systems
Relationships and data sanitization: a study in scarlet
Proceedings of the 2010 workshop on New security paradigms
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Hi-index | 0.00 |
Balancing the needs of a data analyst with the privacy needs of a data provider is a key issue when data is sanitized. This work treats both the requirements of the analyst and the privacy expectations as policies, and composes the two policies to detect conflicts. The result can be applied to an intermediate data representation to sanitize the relevant parts of the data. We conclude that this method has promise, but more work is needed to determine its effectiveness and limits.