Data Leakage Quantification

نویسندگان

  • Sokratis Vavilis
  • Milan Petkovic
  • Nicola Zannone
چکیده

The detection and handling of data leakages is becoming a critical issue for organizations. To this end, data leakage solutions are usually employed by organizations to monitor network traffic and the use of portable storage devices. These solutions often produce a large number of alerts, whose analysis is timeconsuming and costly for organizations. To effectively handle leakage incidents, organizations should be able to focus on the most severe incidents. Therefore, alerts need to be prioritized with respect to their severity. This work presents a novel approach for the quantification of data leakages based on their severity. The approach quantifies leakages with respect to the amount and sensitivity of the leaked information as well as the ability to identify the data subjects of the leaked information. To specify and reason on data sensitivity in an application domain, we propose a data model representing the knowledge in the domain. We validate our approach by analyzing data leakages within a healthcare environment.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Forest Carbon Leakage Quantification Methods and Their Suitability for Assessing Leakage in REDD

This paper assesses quantification methods for carbon leakage from forestry activities for their suitability in leakage accounting in a future Reducing Emissions from Deforestation and Forest Degradation (REDD) mechanism. To that end, we first conducted a literature review to identify specific pre-requisites for leakage assessment in REDD. We then analyzed a total of 34 quantification methods f...

متن کامل

Leakage Quantification of Cryptographic Operations

Perfectly secure protocols are often too inefficient performance wise to be used in a practical setting. On the other hand, an insecure (but faster) protocol might be deemed secure for a particular setting. Recent research has thus focused on precise leakage quantification of a security protocol. In this context, we first give precise leakage quantification of a basic cryptographic primitive, t...

متن کامل

A severity-based quantification of data leakages in database systems

The detection and handling of data leakages is becoming a critical issue for organizations. To this end, data leakage solutions are usually employed by organizations to monitor network traffic and the use of portable storage devices. However, these solutions often produce a large number of alerts, whose analysis is time-consuming and costly for organizations. To effectively handle leakage incid...

متن کامل

New Techniques for the Quantification of Defects Through Pulsed Magnetic Flux Leakage

Although the probability of defect detection using magnetic flux leakage (MFL) inspection is sufficient for most applications for which it is used; inspection of ferromagnetic pipeline, wire rope, etc., accurate defect characterisation is problematic. The use of pulsed excitation in conjunction with MFL provides an opportunity for the extraction of depth information from the MFL signal using an...

متن کامل

Air Leakage: Difficulties in Measurement, Quantification and Energy Simulation

Air leakage through the building enclosure can have a significant impact on heating and cooling loads. Unfortunately, the measurement of air leakage through enclosure systems and components can be very difficult in practice. Inaccurate quantification of air leakage can affect building performance and may lead to incorrectly-sized mechanical systems and unreliable results from whole building ene...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014