On the Declassification of Confidential Documents
نویسندگان
چکیده
Abstract. We introduce the anonymization of unstructured documents to settle the base of automatic declassification of confidential documents. Departing from known ideas and methods of data privacy, we introduce the main issues of unstructured document anonymization and propose the use of named entity recognition techniques from natural language processing and information extraction to identify the entities of the document that need to be protected. URL http://www.springerlink.com/content/tg81j807q42x8837/ [14] Source URL: https://www.iiia.csic.es/en/node/54954 Links [1] https://www.iiia.csic.es/en/staff/daniel-abril [2] https://www.iiia.csic.es/en/staff/guillermo-navarro-arribas [3] https://www.iiia.csic.es/en/staff/vicen%C3%A7-torra [4] https://www.iiia.csic.es/en/bibliography?f[author]=2512 [5] https://www.iiia.csic.es/en/bibliography?f[author]=1995 [6] https://www.iiia.csic.es/en/bibliography?f[keyword]=871 [7] https://www.iiia.csic.es/en/bibliography?f[keyword]=497 [8] https://www.iiia.csic.es/en/bibliography?f[keyword]=929 [9] https://www.iiia.csic.es/en/bibliography?f[keyword]=447 [10] https://www.iiia.csic.es/en/bibliography?f[keyword]=933 [11] https://www.iiia.csic.es/en/bibliography?f[keyword]=932 [12] https://www.iiia.csic.es/en/bibliography?f[keyword]=930 [13] https://www.iiia.csic.es/en/bibliography?f[keyword]=931 [14] http://www.springerlink.com/content/tg81j807q42x8837/
منابع مشابه
On the declassification of confidential documents
Abstract. We introduce the anonymization of unstructured documents to settle the base of automatic declassification of confidential documents. Departing from known ideas and methods of data privacy, we introduce the main issues of unstructured document anonymization and propose the use of named entity recognition techniques from natural language processing and information extraction to identify...
متن کاملAutomatic Declassification of Textual Documents by Generalizing Sensitive Terms
With the advent of internet, large numbers of text documents are published and shared every day . Each of these documents is a collection of vast amount of information. Publically sharing of some of this information may affect the privacy of the document, if they are confidential information. So before document publishing, sanitization operations are performed on the document for preserving the...
متن کاملFlow-Sensitive Automaton-Based Monitoring of a Declassification Policy
Declassification policies aim to guarantee trusted release of confidential information. The semantic security conditions of declassification policies focus on different dimensions. In order to prevent the special attacks aiming to compromise the mechanisms of declassification, it is important for a declassification policy to combine different dimensions. Moreover, current body of work on the en...
متن کاملRobust Declassification
Security properties based on information flow, such as noninterference, provide strong guarantees that confidentiality is maintained. However, programs often need to leak some amount of confidential information in order to serve their intended purpose, and thus violate noninterference. Real systems that control information flow often include mechanisms for downgrading or declassifying informati...
متن کاملType Abstraction for Relaxed Noninterference
Information-flow security typing statically prevents confidential information to leak to public channels. The fundamental information flow property, known as noninterference, states that a public observer cannot learn anything from private data. As attractive as it is from a theoretical viewpoint, noninterference is impractical: real systems need to intentionally declassify some information, se...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011