A fast string searching algorithm
Communications of the ACM
Efficient string matching: an aid to bibliographic search
Communications of the ACM
Introduction to Computer Security
Introduction to Computer Security
Understanding data lifetime via whole system simulation
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Information Leakage Caused by Hidden Data in Published Documents
IEEE Security and Privacy
PETS '08 Proceedings of the 8th international symposium on Privacy Enhancing Technologies
Private Data Discovery for Privacy Compliance in Collaborative Environments
CDVE '08 Proceedings of the 5th international conference on Cooperative Design, Visualization, and Engineering
Private data management in collaborative environments
CDVE'07 Proceedings of the 4th international conference on Cooperative design, visualization, and engineering
Personal health information leak prevention in heterogeneous texts
AdaptLRTtoND '09 Proceedings of the Workshop on Adaptation of Language Resources and Technology to New Domains
Hi-index | 0.00 |
Sometimes, it is necessary to remove author names and other personally identifiable information (PII) from documents before publication. We have implemented a novel defensive tool for detecting such data automatically. By using the detection tool, we have learned about where PII may be stored in documents and how it is put there. A key observation is that, contrary to common belief, user and machine identifiers and other metadata are not embedded in documents only by a single piece of software, such as a word processor, but by various tools used at different stages of the document authoring process.