DCNL: Disclosure Control of Natural Language Information to Enable Secure and Enjoyable E-Communications
نویسندگان
چکیده
Natural language communications using social networking and blogging services can result in the undesired revelation of private information. Existing disclosure control is tedious and error-prone because the user must set the disclosure level manually and must reconsider the level every time a new text is to be uploaded. This can lead to the revelation of private information or reduced enjoyment of the communication due to either disclosing too much text or hiding text that is meant to be shared. To solve these problems, we are developing a new disclosure control mechanism called DCNL or disclosure control of natural language information. DCNL automatically checks texts uploaded to social networking services or blog pages, detects words that might reveal private information, and warns the user about them. The granularity of DCNL is not the text but the words in the text. Consequently, it is not tiresome for the user and balances the protection of privacy with the enjoyment of communications. DCNL checks not only words that directly represent private information but also those that indirectly suggest it. Combinations of words are also checked. Analysis of the co-occurrence between words and reachability analysis with a search engine are used to infer what words imply what information.
منابع مشابه
Disclosure Control of Natural Language Information to Enable Secure and Enjoyable Communication over the Internet
Disclosure control of natural language information (DCNL), which we are trying to realize, is described. DCNL will be used for securing human communications over the internet, such as through blogs and social network services. Before sentences in the communications are disclosed, they are checked by DCNL and any phrases that could reveal sensitive information are transformed or omitted so that ...
متن کاملMitigating Node Capture Attack in Random Key Distribution Schemes through Key Deletion
Random Key Distribution (RKD) schemes have been widely accepted to enable low-cost secure communications in Wireless Sensor Networks (WSNs). However, efficiency of secure link establishment comes with the risk of compromised communications between benign nodes by adversaries who physically capture sensor nodes. The challenge is to enhance resilience of WSN against node capture, while maintainin...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملAuthorization models for secure information sharing: a survey and research agenda
This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010