Article ID Journal Published Year Pages File Type
6900740 Procedia Computer Science 2018 7 Pages PDF
Abstract
In today's on-growing world, there is need to share the information within or outside the enterprise which includes the sensitive information of the enterprise also. For example: companies has to share its sensitive information with its partners, employees and various other entities. This sensitive data can be leaked by third party. Later on, distributor finds the leaked documents at some unauthorized place (eg. through legal discovery process, on user's drive or the web). We propose a model which assesses the likelihood that the data has been leaked by one or more agents or it has been independently gathered by some other means. The goal of the model is to protect the sensitive information by detecting the leakage and identifying the leaker responsible for data leakage.
Related Topics
Physical Sciences and Engineering Computer Science Computer Science (General)
Authors
, ,