Using Unobtrusive Techniques for Detecting Leakage of Data

نویسندگان

  • Shailaja B. Jadhav
  • Prachi Joshi
چکیده

While doing business, there are situations when some important information or data should be handed over to some third parties. The data important to organization must be secured but the third parties are not that careful about the data. So there is possibility that the data gets leaked. Here in this paper we are considering the chances that the third party is responsible for the leakage. We propose data allocation strategies (across the agents) that improve the probability of identifying leakages. There are some available techniques like watermarking, perturbation used to identifying data leakage, but those are having few drawbacks. So we are trying to detect the leakage by using a technique called unobtrusive. This technique will give us results in many prospective to find out leakage of the important data.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Relational Data Leakage Detection using Fake Object and Allocation Strategies

In today’s world, there is need of many companies to outsource their sure business processes (e.g. marketing ,human resources) and related activities to a third party like their service suppliers. In many cases the service supplier desires access to the company’s confidential information like customer data, bank details to hold out their services. And for most corporations the amount of sensiti...

متن کامل

Teaching English Pragmatics in an EFL Context: Effects of Obtrusive and Unobtrusive Focus on Form Instructions

With the aim of more emphasis on pragmatics and its inclusion in EFL classrooms, this study attempted to investigate the effectiveness of obtrusive and unobtrusive focus on form instructions on learners’ pragmatic performance of criticizing in English. 54 Iranian learners, all at intermediate level, participated in this study, and they were divided into three groups: 19 participants receiving o...

متن کامل

Bacterial Leakage Assessment for Different Types of Resin-Based Dental Restorations Applied Using Various Placement Methods

Introduction: Although composite resins have improved greatly since their introduction, microleakage is one of the most frequently encountered problems. This study compared the effects of different monomer systems and layering techniques on the bacterial leakage of Cl I composite resin restorations. Methods: Eighty-two sound human third molars were used. The teeth were randomly divided into six...

متن کامل

Comparison of Bacterial Leakage between 3 Different Root Canal Obturation Techniques in Oval Shaped Canals

Introduction: The purpose of this study was to evaluate the sealing ability of 3 obturation techniques in oval-shaped canals by bacterial leakage assessment. Methods: Sixty mandibular incisors with oval canals were selected after providing buccolingual and mesiodistal radiographs. The teeth were sectioned at a 10 mm distance from the apex. After instrumentation, the teeth were divided into 3 gr...

متن کامل

Detecting Diseases in Medical Prescriptions Using Data Mining Tools and Combining Techniques

Data about the prevalence of communicable and non-communicable diseases, as one of the most important categories of epidemiological data, is used for interpreting health status of communities. This study aims to calculate the prevalence of outpatient diseases through the characterization of outpatient prescriptions. The data used in this study is collected from 1412 prescriptions for various ty...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013