IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 6    
Website: http://www.ijser.org
scirp IJSER >> Volume 3,Issue 6,June 2012
Data Leakage and Detection of Guilty Agent[
Full Text(PDF, )  PP.980-984  
Rupesh Mishra, D.K. Chitre
—Allocation strategies, Data distribution, Data leakage, Data privacy, Fake records, Guilty agent, Leakage Model
Organizations apply data or information security only in terms of protecting their network from intruders (e.g. hackers) but with growing amount of sensitive data and rapid growth in the sizes of organizations (e.g. due to globalization), rise in number of data points (machines and servers) and easier modes of communication, sometime accidental or even deliberate leakage of data from within the organization has become a painful reality. This has lead to growing awareness about sensitive data security in general and about outbound content management in particular. 
[1] Peter Gordon ―Data Leakage – Threats and Mitigation‖ SANS Institute Reading Room October 15, 2007

[2] J. Clerk Ma P. Papadimitriou and H. Garcia-Molina, ―Data leakage detection,‖ Stanford University.

[3] R. Agrawal and J. Kiernan, ―Watermarking Relational Databases,‖Proc. 28th Int’l Conf. Very Large Data Bases (VLDB ’02), VLDB Endowment, pp. 155-166, 2002.

[4] Panagiotis Papadimitriou, Student Member, IEEE, and Hector Garcia-Molina, Member, IEEE ―Data Leakage Detection― IEEE Transactions on knowledge and data engineering, Vol. 23, NO. 1, January 2011

[5] P. Buneman and W.-C. Tan, ―Provenance in Databases,‖ Proc. ACM SIGMOD, pp. 1171-1173, 2007.

[6] Y. Cui and J. Widom, ―Lineage Tracing for General Data Warehouse Transformations,‖ The VLDB J., vol. 12, pp. 41-58, 2003.

[7] S. Jajodia, P. Samarati, M.L. Sapino, and V.S. Subrahmanian, ―Flexible Support for Multiple Access Control Policies,‖ ACM Trans. Database Systems, vol. 26, no. 2, pp. 214-260, 2001.

[8] P. Bonatti, S.D.C. di Vimercati, and P. Samarati, ―An Algebra for Composing Access Control Policies,‖ ACM Trans. Information and SystemSecurity, vol.5, no.1, pp.1-35, 2002.

Untitled Page