Disclosure Control of Natural Language Information to Enable Secure and Enjoyable Communication over the Internet

نویسندگان

  • Haruno Kataoka
  • Akira Utsumi
  • Yuki Hirose
  • Hiroshi Yoshiura
چکیده

Disclosure control of natural language information (DCNL), which we are trying to realize, is described. DCNL will be used for securing human communications over the internet, such as through blogs and social network services. Before sentences in the communications are disclosed, they are checked by DCNL and any phrases that could reveal sensitive information are transformed or omitted so that they are no longer revealing. DCNL checks not only phrases that directly represent sensitive information but also those that indirectly suggest it. Combinations of phrases are also checked. DCNL automatically learns the knowledge of sensitive phrases and the suggestive relations between phrases by using co-occurrence analysis and Web retrieval. The users’ burden is therefore minimized, i.e., they do not need to define many disclosure control rules. DCNL complements the traditional access control in the fields where reliability needs to be balanced with enjoyment and objects classes for the access control cannot be predefined.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DCNL: Disclosure Control of Natural Language Information to Enable Secure and Enjoyable E-Communications

Natural language communications using social networking and blogging services can result in the undesired revelation of private information. Existing disclosure control is tedious and error-prone because the user must set the disclosure level manually and must reconsider the level every time a new text is to be uploaded. This can lead to the revelation of private information or reduced enjoymen...

متن کامل

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

IMPACT OF SYNCHRONOUS COMPUTER-MEDIATED COMMUNICATION ON EFL LEARNERS’ COLLABORATION: A QUANTITATIVE ANALYSIS

For the last two decades, computers have entered people’s lives in an unprecedented manner in a way that almost everybody considers life without them rather impossible. In recent years, researchers and educators have been trying to discover how computers and the Internet technology can maximize the quality of language instruction. As such, the present experimental study sought to investigate th...

متن کامل

A Method for Protecting Access Pattern in Outsourced Data

Protecting the information access pattern, which means preventing the disclosure of data and structural details of databases, is very important in working with data, especially in the cases of outsourced databases and databases with Internet access. The protection of the information access pattern indicates that mere data confidentiality is not sufficient and the privacy of queries and accesses...

متن کامل

Effectiveness of Acceptance and Commitment Therapy on Sleep Quality, Academic Hope, Students' Anxiety with Online Gambling Disorder without Comorbidity of ADHD Disorder

Introduction & Objective: Throughout human history, there have been structured games among all cultures. Playing can be enjoyable, fun, and relaxing and can be used as a way to escape from everyday life. In addition to being a fun pastime, gaming is a social activity in which people with common interests interact with each other. With the popularity of computers, tablets, and smartphones and th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007