The Rules of Redaction Identify, Protect, Review (and Repeat)

被引:24
作者
Bier, Eric [1 ]
Chow, Richard [2 ]
Golle, Philippe
King, Tracy Holloway
Staddon, Jessica
机构
[1] Palo Alto Res Ctr, Intelligent Syst Lab, Human Informat Interact Area, Palo Alto, CA USA
[2] Palo Alto Res Ctr, Secur & Privacy Grp, Palo Alto, CA USA
关键词
Access control; Privacy; Redaction;
D O I
10.1109/MSP.2009.183
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Frequent data leak reports in the press attest to the difficulty of identifying and protecting sensitive content. Redaction is particularly challenging because it seeks to protect documents by selectively removing sensitive portions of them, rather than by quarantining or encrypting the whole document. The authors review current redaction practice and technology and describe a prototype system that supports the natural redaction workflow and addresses some limitations of current technology. Their system supports all phases of the redaction process through the use of linguistic content analysis, an interactive user interface, and inference detection algorithms. © 2009 IEEE.
引用
收藏
页码:46 / 53
页数:8
相关论文
共 15 条
[1]   A document corpus browser for in-depth reading [J].
Bier, E ;
Good, L ;
Popat, K ;
Newberger, A .
JCDL 2004: PROCEEDINGS OF THE FOURTH ACM/IEEE JOINT CONFERENCE ON DIGITAL LIBRARIES: GLOBAL REACH AND DIVERSE IMPACT, 2004, :87-96
[2]  
BIER E, 2006, P C HUM FACT COMP SY
[3]  
Bier EA, 2006, LECT NOTES COMPUT SC, V3975, P466
[4]  
CHOW R, 2008, P INT C KNOWL DISC D
[5]  
CHOW R, 2009, SANITIZATIONS SLIPPE
[6]  
Golle P., 2006, P 5 ACM WORKSH PRIV, P77
[7]  
KAPLAN A, 2002, NATL LAW J 1114
[8]  
KING TH, 2007, P GRAMM ENG FRAM, P182
[9]  
MARKOFF J, 2004, NY TIMES 0510
[10]  
QIAN X, 1993, IEEE S SEC PRIV, P196