Discovering and Sharing Sensitive Text

نویسندگان

  • Chris Clifton
  • Mummoorthy Murugesan
چکیده

There is an increasing realization of the need to share sensitive information across organizational boundaries; much of it in textual form. While search and information retrieval technology has progressed significantly, it assumes an open environment. Providing these capabilities when the information, and the need for that information, are sensitive and cannot be openly disclosed poses significant research challenges. We give an example showing how such challenges can be addressed, and outline some of the open research challenges in secure sharing of textual data. A key finding of the 9-11 commission was that the U.S. government needs to move from an information access policy of need to know to need to share. Unfortunately, while the report views this as a straightforward (although not simple) change in culture, the details prove more difficult. For example, the report suggests: ... when a report is first created, its data be separated from the sources and methods by which they are obtained. The report should begin with the information in its most sharable, but still meaningful, form. Therefore the maximum number of recipients can access some form of that information. If knowledge of further details becomes important, any user can query further, with access granted or denied according to the rules set for the network-and with queries leaving an audit trail in order to determine who accessed the information. [10] The problem is that it is likely that the sensitive information in the “further details” may be precisely what makes the report relevant, e.g., the name of a source. This is recognized in the Markle foundation report that the 9-11 commission cites as evidence of the technological feasibility: The network, too, must not only enable users to push information to others, it must also enable users to pull it on demand, or at least give each user pointers to a person who can determine whether the user is authorized to access the information. [8] It is clear that techniques are needed to determine if users need information without disclosing sensitive data (unless the need for it exists.) “Need to share” moves this onus from the information consumer to the information producer, but as the need for information (e.g., based on the identity of an individual under investigation) may be as sensitive as the information to be shared, the fundamental problems remain. This is not purely a government problem; the ever increasing public information sharing facilities raise similar issues. Imagine, for example, an employee of Google with an entrepreneurial bent using publicly available resources of Google (search, docs, calendar) to research and develop a new idea

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A review of text mining approaches and their function in discovering and extracting a topic

Background and aim: Four text mining methods are examined and focused on understanding and identifying their properties and limitations in subject discovery. Methodology: The study is an analytical review of the literature of text mining and topic modeling.  Findings: LSA could be used to classify specific and unique topics in documents that address only a single topic. The other three text min...

متن کامل

A deconstructive critique of a mystical anecdote from the book Ronaq al-Majalis [The Prosperity of Meetings]

     Deconstruction was first introduced in the thought of Jacques Derrida as a way of re-reading texts and questioning its presuppositions. This type of critique seeks to find new meanings by finding binary oppositions in the text and disrupting the superiority and domination of one side over the other, and on the other hand, by discovering gaps and discontinuities that have arisen in the text...

متن کامل

INVENTORY MODEL FOR DETERIORATING ITEMS WITH REVENUE SHARING ON PRESERVATION TECHNOLOGY INVESTMENT UNDER PRICE SENSITIVE STOCK DEPENDENT DEMAND

The objective of this research is to tackle the emerging problem of jointly determining theoptimal retail price, the replenishment cycle, and the cost of preservation technology investment from an integrated perspective among the supplier and the manufacturer. This paper deals an integrated single-manufacturer single-retailer supply chain model for deteriorating items under revenue sharing on p...

متن کامل

A review on Security in Distributed Information Sharing

In recent year’s privacy preserving data mining has emerged as a very active research area in data mining. Over the last few years this has naturally lead to a growing interest in security or privacy issues in data mining. More precisely, it became clear that discovering knowledge through a combination of different databases raises important security issues. Privacy preserving data mining is on...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008