Search dblp for Publications

export results for "confidential information"

 download as .bib file

@article{DBLP:journals/ijmi/AfrazMSAJ24,
  author       = {Ali Afraz and
                  Mahdieh Montazeri and
                  Mahin Eslami Shahrbabaki and
                  Leila Ahmadian and
                  Yunes Jahani},
  title        = {The viewpoints of parents of children with mental disorders regarding
                  the confidentiality and security of their children's information in
                  the Iranian national electronic health record system},
  journal      = {Int. J. Medical Informatics},
  volume       = {183},
  pages        = {105334},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ijmedinf.2023.105334},
  doi          = {10.1016/J.IJMEDINF.2023.105334},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijmi/AfrazMSAJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/AlSumaidaeeZ24,
  author       = {Ghassan Al{-}Sumaidaee and
                  Zeljko Zilic},
  title        = {Sensing Data Concealment in NFTs: {A} Steganographic Model for Confidential
                  Cross-Border Information Exchange},
  journal      = {Sensors},
  volume       = {24},
  number       = {4},
  pages        = {1264},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24041264},
  doi          = {10.3390/S24041264},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/AlSumaidaeeZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/VermaC24,
  author       = {Praveen Verma and
                  Chandan Chakraborty},
  title        = {High Impact Local Load Redistribution Attack Without Confidential
                  Network Information},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {15},
  number       = {2},
  pages        = {2383--2386},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSG.2023.3343125},
  doi          = {10.1109/TSG.2023.3343125},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsg/VermaC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Bannour23,
  author       = {Nesrine Bannour},
  title        = {Information Extraction from Electronic Health Records: Studies on
                  temporal ordering, privacy and environmental impact. (Extraction d'Informations
                  {\`{a}} partir des Dossiers Patients Informatis{\'{e}}s: Etudes
                  en temporalit{\'{e}}, confidentialit{\'{e}} et impact environnemental)},
  school       = {University of Paris-Saclay, France},
  year         = {2023},
  url          = {https://tel.archives-ouvertes.fr/tel-04347666},
  timestamp    = {Thu, 04 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/hal/Bannour23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aci/BedgoodRBGCSPPM23,
  author       = {Michael Bedgood and
                  Naveed Rabbani and
                  Conner Brown and
                  Rachel Goldstein and
                  Jennifer L. Carlson and
                  Ethan Steinberg and
                  Austin Powell and
                  Natalie M. Pageler and
                  Keith E. Morse},
  title        = {The Prevalence of Confidential Content in Adolescent Progress Notes
                  Prior to the 21st Century Cures Act Information Blocking Mandate},
  journal      = {Appl. Clin. Inform.},
  volume       = {14},
  number       = {2},
  pages        = {337--344},
  year         = {2023},
  url          = {https://doi.org/10.1055/s-0043-1767682},
  doi          = {10.1055/S-0043-1767682},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aci/BedgoodRBGCSPPM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/AnwarulKBAH23,
  author       = {Shahina Anwarul and
                  Sunil Kumar and
                  Ashok Bhansali and
                  Hammam A. Alshazly and
                  Hany S. Hussein},
  title        = {Hybrid Dynamic Optimization for Multilevel Security System in Disseminating
                  Confidential Information},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {47},
  number       = {3},
  pages        = {3145--3163},
  year         = {2023},
  url          = {https://doi.org/10.32604/csse.2023.041061},
  doi          = {10.32604/CSSE.2023.041061},
  timestamp    = {Mon, 04 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csse/AnwarulKBAH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/WuXSZZ23,
  author       = {Bingxue Wu and
                  Sai Xu and
                  Yu Shao and
                  Jiliang Zhang and
                  Jie Zhang},
  title        = {{IRS} Backscatter Based Hybrid Confidential Information and {AN} for
                  Secrecy Transmission},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {27},
  number       = {2},
  pages        = {462--466},
  year         = {2023},
  url          = {https://doi.org/10.1109/LCOMM.2022.3225244},
  doi          = {10.1109/LCOMM.2022.3225244},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/icl/WuXSZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmi/AlipourMKKA23,
  author       = {Jahanpour Alipour and
                  Yousef Mehdipour and
                  Afsaneh Karimi and
                  Mohadeseh Khorashadizadeh and
                  Maryam Akbarpour},
  title        = {Security, confidentiality, privacy and patient safety in the hospital
                  information systems from the users' perspective: {A} cross-sectional
                  study},
  journal      = {Int. J. Medical Informatics},
  volume       = {175},
  pages        = {105066},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijmedinf.2023.105066},
  doi          = {10.1016/J.IJMEDINF.2023.105066},
  timestamp    = {Sun, 04 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmi/AlipourMKKA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/MarimuthuMKV23,
  author       = {M. Marimuthu and
                  G. Mohanraj and
                  D. Karthikeyan and
                  D. Vidyabharathi},
  title        = {Safeguard confidential web information from malicious browser extension
                  using Encryption and Isolation techniques},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {45},
  number       = {4},
  pages        = {6145--6160},
  year         = {2023},
  url          = {https://doi.org/10.3233/jifs-233122},
  doi          = {10.3233/JIFS-233122},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jifs/MarimuthuMKV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/KhanKHJ23,
  author       = {Lal Said Khan and
                  Majid Khan and
                  Mohammad Mazyad Hazzazi and
                  Sajjad Shaukat Jamal},
  title        = {A novel combination of information confidentiality and data hiding
                  mechanism},
  journal      = {Multim. Tools Appl.},
  volume       = {82},
  number       = {5},
  pages        = {6917--6941},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11042-022-13623-3},
  doi          = {10.1007/S11042-022-13623-3},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/KhanKHJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/HlaingA23,
  author       = {Htet Htet Hlaing and
                  Hitoshi Asaeda},
  title        = {Ensuring Content Integrity and Confidentiality in Information-Centric
                  Secure Networks},
  booktitle    = {20th {IEEE} Consumer Communications {\&} Networking Conference,
                  {CCNC} 2023, Las Vegas, NV, USA, January 8-11, 2023},
  pages        = {810--816},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CCNC51644.2023.10060672},
  doi          = {10.1109/CCNC51644.2023.10060672},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/HlaingA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsc2/MousayMB23,
  author       = {Fatimah Dawoud Mousay and
                  Souad I. Mugassabi and
                  Asma Ail Budalal},
  title        = {Security Measures for Ensuring Confidentiality of Information Using
                  Encryption by Elliptic Curve with Precomputation},
  booktitle    = {11th {IEEE} International Conference on Systems and Control, {ICSC}
                  2023, Sousse, Tunisia, December 18-20, 2023},
  pages        = {938--942},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICSC58660.2023.10449816},
  doi          = {10.1109/ICSC58660.2023.10449816},
  timestamp    = {Wed, 13 Mar 2024 19:10:52 +0100},
  biburl       = {https://dblp.org/rec/conf/icsc2/MousayMB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/jcsse/VhitoC23,
  author       = {Kudakwashe Vhito and
                  Varin Chouvatut},
  title        = {Steganography with Adaptable Separate Encrypted Code of Hidden Confidential
                  Information},
  booktitle    = {20th {IEEE} International Joint Conference on Computer Science and
                  Software Engineering, {JCSSE} 2023, Phitsanulok, Thailand, June 28
                  - July 1, 2023},
  pages        = {523--528},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/JCSSE58229.2023.10202145},
  doi          = {10.1109/JCSSE58229.2023.10202145},
  timestamp    = {Tue, 22 Aug 2023 08:08:17 +0200},
  biburl       = {https://dblp.org/rec/conf/jcsse/VhitoC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-00016,
  author       = {Robinson Onyemechi Oturugbum},
  title        = {Preserving The Safety And Confidentiality Of Data Mining Information
                  In Health Care: {A} literature review},
  journal      = {CoRR},
  volume       = {abs/2312.00016},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.00016},
  doi          = {10.48550/ARXIV.2312.00016},
  eprinttype    = {arXiv},
  eprint       = {2312.00016},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-00016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/RizwanSJSGSH22,
  author       = {Muhammad Rizwan and
                  Aysha Shabbir and
                  Abdul Rehman Javed and
                  Gautam Srivastava and
                  Thippa Reddy Gadekallu and
                  Maryam Shabir and
                  Muhammad Abul Hassan},
  title        = {Risk monitoring strategy for confidentiality of healthcare information},
  journal      = {Comput. Electr. Eng.},
  volume       = {100},
  pages        = {107833},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.compeleceng.2022.107833},
  doi          = {10.1016/J.COMPELECENG.2022.107833},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/RizwanSJSGSH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/digitalsociety/Schneider22,
  author       = {Diana Schneider},
  title        = {Ensuring Privacy and Confidentiality in Social Work Through Intentional
                  Omissions of Information in Client Information Systems: a Qualitative
                  Study of Available and Non-available Data},
  journal      = {Digit. Soc.},
  volume       = {1},
  number       = {3},
  year         = {2022},
  url          = {https://doi.org/10.1007/s44206-022-00029-9},
  doi          = {10.1007/S44206-022-00029-9},
  timestamp    = {Thu, 13 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/digitalsociety/Schneider22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/LinLCW22,
  author       = {Pei{-}Yu Lin and
                  Wen{-}Shao Lan and
                  Yi{-}Hui Chen and
                  Wen{-}Chuan Wu},
  title        = {A Confidential {QR} Code Approach with Higher Information Privacy},
  journal      = {Entropy},
  volume       = {24},
  number       = {2},
  pages        = {284},
  year         = {2022},
  url          = {https://doi.org/10.3390/e24020284},
  doi          = {10.3390/E24020284},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entropy/LinLCW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/TakanaK22,
  author       = {Norimasa Takana and
                  Hiroki Kashiwazaki},
  editor       = {Hong Va Leong and
                  Sahra Sedigh Sarvestani and
                  Yuuichi Teranishi and
                  Alfredo Cuzzocrea and
                  Hiroki Kashiwazaki and
                  Dave Towey and
                  Ji{-}Jiang Yang and
                  Hossain Shahriar},
  title        = {Design and evaluation of a dedicated information environment with
                  both portability and confidentiality},
  booktitle    = {46th {IEEE} Annual Computers, Software, and Applications Conferenc,
                  {COMPSAC} 2022, Los Alamitos, CA, USA, June 27 - July 1, 2022},
  pages        = {1038--1043},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/COMPSAC54236.2022.00162},
  doi          = {10.1109/COMPSAC54236.2022.00162},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/compsac/TakanaK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/ChadwickGDD22,
  author       = {Samuel Chadwick and
                  Scott R. Graham and
                  James Dean and
                  Matthew Dallmeyer},
  editor       = {Jason Staggs and
                  Sujeet Shenoi},
  title        = {Leveraging Confidential Computing to Enable Secure Information Sharing},
  booktitle    = {Critical Infrastructure Protection {XVI} - 16th {IFIP} {WG} 11.10
                  International Conference, {ICCIP} 2022, Virtual Event, March 14-15,
                  2022, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {666},
  pages        = {235--252},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-20137-0\_9},
  doi          = {10.1007/978-3-031-20137-0\_9},
  timestamp    = {Thu, 08 Dec 2022 17:43:50 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/ChadwickGDD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Fernandes21,
  author       = {Natasha Fernandes},
  title        = {Differential Privacy for Metric Spaces: Information-Theoretic Models
                  for Privacy and Utility with New Applications to Metric Domains. (Confidentialit{\'{e}}
                  diff{\'{e}}rentielle pour les espaces m{\'{e}}triques: mod{\`{e}}les
                  th{\'{e}}oriques de l'information pour la confidentialit{\'{e}}
                  et l'utilit{\'{e}} avec de nouvelles applications aux domaines
                  m{\'{e}}triques)},
  school       = {{\'{E}}cole Polytechnique, Palaiseau, France},
  year         = {2021},
  url          = {https://tel.archives-ouvertes.fr/tel-03344453},
  timestamp    = {Thu, 06 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/hal/Fernandes21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ar/OyamaYNTAOO21,
  author       = {Eimei Oyama and
                  Motoki Yodowatari and
                  Sousuke Nakamura and
                  Kohei Tokoi and
                  Arvin Agah and
                  Hiroyuki Okada and
                  Takashi Omori},
  title        = {Integrating {AR/MR/DR} technology in remote seal to maintain confidentiality
                  of information},
  journal      = {Adv. Robotics},
  volume       = {35},
  number       = {11},
  pages        = {704--714},
  year         = {2021},
  url          = {https://doi.org/10.1080/01691864.2021.1929472},
  doi          = {10.1080/01691864.2021.1929472},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ar/OyamaYNTAOO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mansci/ColemanMMP21,
  author       = {Braiden Coleman and
                  Kenneth J. Merkley and
                  Brian Miller and
                  Joseph Pacelli},
  title        = {Does the Freedom of Information Act Foil the Securities and Exchange
                  Commission's Intent to Keep Investigations Confidential?},
  journal      = {Manag. Sci.},
  volume       = {67},
  number       = {6},
  pages        = {3419--3428},
  year         = {2021},
  url          = {https://doi.org/10.1287/mnsc.2020.3625},
  doi          = {10.1287/MNSC.2020.3625},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mansci/ColemanMMP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/ZhangLL21,
  author       = {Xiaheng Zhang and
                  Jiazhong Lu and
                  Doudou Li},
  title        = {Confidential information protection method of commercial information
                  physical system based on edge computing},
  journal      = {Neural Comput. Appl.},
  volume       = {33},
  number       = {3},
  pages        = {897--907},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00521-020-05272-0},
  doi          = {10.1007/S00521-020-05272-0},
  timestamp    = {Fri, 19 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/nca/ZhangLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/patterns/DydaPCFPRWMHWL21,
  author       = {Amalie Dyda and
                  Michael Purcell and
                  Stephanie Jane Curtis and
                  Emma Field and
                  Priyanka Pillai and
                  Kieran Ricardo and
                  Haotian Weng and
                  Jessica C. Moore and
                  Michael Hewett and
                  Graham Williams and
                  Colleen L. Lau},
  title        = {Differential privacy for public health data: An innovative tool to
                  optimize information sharing while protecting data confidentiality},
  journal      = {Patterns},
  volume       = {2},
  number       = {12},
  pages        = {100366},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.patter.2021.100366},
  doi          = {10.1016/J.PATTER.2021.100366},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/patterns/DydaPCFPRWMHWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/KaurD21,
  author       = {Joti Kaur and
                  Simran Dhillon},
  editor       = {Yolande E. Chan and
                  Maric Boudreau and
                  Benoit Aubert and
                  Guy Par{\'{e}} and
                  Wynne Chin},
  title        = {Privacy calculus and intension to share confidential information},
  booktitle    = {27th Americas Conference on Information Systems, {AMCIS} 2021, Virtual
                  Conference, August 9-13, 2021},
  publisher    = {Association for Information Systems},
  year         = {2021},
  url          = {https://aisel.aisnet.org/amcis2021/info\_security/info\_security/11},
  timestamp    = {Mon, 30 Aug 2021 12:04:20 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/KaurD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/BabenkoSA21,
  author       = {Liudmila Babenko and
                  Alexander Shumilin and
                  Dmitry Alekseev},
  editor       = {Naghmeh Moradpoor and
                  Atilla El{\c{c}}i and
                  Andrei Petrovski},
  title        = {Development of the algorithm to ensure the protection of confidential
                  data in cloud medical information system},
  booktitle    = {14th International Conference on Security of Information and Networks,
                  {SIN} 2021, Edinburgh, United Kingdom, December 15-17, 2021},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SIN54109.2021.9699356},
  doi          = {10.1109/SIN54109.2021.9699356},
  timestamp    = {Wed, 23 Feb 2022 18:55:51 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/BabenkoSA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/CaruccioDPT20,
  author       = {Loredana Caruccio and
                  Domenico Desiato and
                  Giuseppe Polese and
                  Genoveffa Tortora},
  title        = {{GDPR} Compliant Information Confidentiality Preservation in Big Data
                  Processing},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {205034--205050},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3036916},
  doi          = {10.1109/ACCESS.2020.3036916},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/CaruccioDPT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/KhanJW20,
  author       = {Majid Khan and
                  Sajjad Shaukat Jamal and
                  Umer Aziz Waqas},
  title        = {A novel combination of information hiding and confidentiality scheme},
  journal      = {Multim. Tools Appl.},
  volume       = {79},
  number       = {41-42},
  pages        = {30983--31005},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11042-020-09610-1},
  doi          = {10.1007/S11042-020-09610-1},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/KhanJW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/EgoshinKS20,
  author       = {Nikolay Sergeevich Egoshin and
                  Anton Konev and
                  Alexander Alexandrovich Shelupanov},
  title        = {A Model of Threats to the Confidentiality of Information Processed
                  in Cyberspace Based on the Information Flows Model},
  journal      = {Symmetry},
  volume       = {12},
  number       = {11},
  pages        = {1840},
  year         = {2020},
  url          = {https://doi.org/10.3390/sym12111840},
  doi          = {10.3390/SYM12111840},
  timestamp    = {Fri, 24 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/symmetry/EgoshinKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/LiuWLWGN20,
  author       = {Zhixin Liu and
                  Sainan Wang and
                  Yang Liu and
                  Yu Wang and
                  Xinping Guan and
                  Dusit Niyato},
  title        = {Robust Secure Transmission and Power Transfer in Heterogeneous Networks
                  With Confidential Information},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {69},
  number       = {10},
  pages        = {11192--11205},
  year         = {2020},
  url          = {https://doi.org/10.1109/TVT.2020.3008349},
  doi          = {10.1109/TVT.2020.3008349},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvt/LiuWLWGN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csonet/MamtaGCP20,
  author       = {Mamta and
                  Brij Bhooshan Gupta and
                  Kwok Tai Chui and
                  Konstantinos E. Psannis},
  editor       = {Sriram Chellappan and
                  Kim{-}Kwang Raymond Choo and
                  NhatHai Phan},
  title        = {Metadata Security Measures for Protecting Confidential Information
                  on the Cloud},
  booktitle    = {Computational Data and Social Networks - 9th International Conference,
                  CSoNet 2020, Dallas, TX, USA, December 11-13, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12575},
  pages        = {398--410},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-66046-8\_33},
  doi          = {10.1007/978-3-030-66046-8\_33},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csonet/MamtaGCP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecai/JiangLYJG0H20,
  author       = {Jianguo Jiang and
                  Yue Lu and
                  Min Yu and
                  Yantao Jia and
                  Jiafeng Guo and
                  Chao Liu and
                  Weiqing Huang},
  editor       = {Giuseppe De Giacomo and
                  Alejandro Catal{\'{a}} and
                  Bistra Dilkina and
                  Michela Milano and
                  Sen{\'{e}}n Barro and
                  Alberto Bugar{\'{\i}}n and
                  J{\'{e}}r{\^{o}}me Lang},
  title        = {CIDetector: Semi-Supervised Method for Multi-Topic Confidential Information
                  Detection},
  booktitle    = {{ECAI} 2020 - 24th European Conference on Artificial Intelligence,
                  29 August-8 September 2020, Santiago de Compostela, Spain, August
                  29 - September 8, 2020 - Including 10th Conference on Prestigious
                  Applications of Artificial Intelligence {(PAIS} 2020)},
  series       = {Frontiers in Artificial Intelligence and Applications},
  volume       = {325},
  pages        = {1834--1841},
  publisher    = {{IOS} Press},
  year         = {2020},
  url          = {https://doi.org/10.3233/FAIA200299},
  doi          = {10.3233/FAIA200299},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecai/JiangLYJG0H20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/haisa/ShojaifarF20,
  author       = {Alireza Shojaifar and
                  Samuel A. Fricker},
  editor       = {Nathan L. Clarke and
                  Steven Furnell},
  title        = {SMEs' Confidentiality Concerns for Security Information Sharing},
  booktitle    = {Human Aspects of Information Security and Assurance - 14th {IFIP}
                  {WG} 11.12 International Symposium, {HAISA} 2020, Mytilene, Lesbos,
                  Greece, July 8-10, 2020, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {593},
  pages        = {289--299},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57404-8\_22},
  doi          = {10.1007/978-3-030-57404-8\_22},
  timestamp    = {Tue, 25 Aug 2020 19:09:10 +0200},
  biburl       = {https://dblp.org/rec/conf/haisa/ShojaifarF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icinco/IurevaTPK20,
  author       = {Radda A. Iureva and
                  Sergey V. Taranov and
                  Alexander V. Penskoi and
                  Artem S. Kremlev},
  editor       = {Oleg Gusikhin and
                  Kurosh Madani and
                  Janan Zaytoon},
  title        = {Ensuring Confidentiality of Information When Processing Operational
                  Production Plans in Cloud Services},
  booktitle    = {Proceedings of the 17th International Conference on Informatics in
                  Control, Automation and Robotics, {ICINCO} 2020, Lieusaint, Paris,
                  France, July 7-9, 2020},
  pages        = {167--173},
  publisher    = {ScitePress},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009873201670173},
  doi          = {10.5220/0009873201670173},
  timestamp    = {Tue, 06 Jun 2023 14:58:01 +0200},
  biburl       = {https://dblp.org/rec/conf/icinco/IurevaTPK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/JiangLY0LAH20,
  author       = {Jianguo Jiang and
                  Yue Lu and
                  Min Yu and
                  Gang Li and
                  Chao Liu and
                  Shaohua An and
                  Weiqing Huang},
  title        = {CES2Vec: {A} Confidentiality-Oriented Word Embedding for Confidential
                  Information Detection},
  booktitle    = {{IEEE} Symposium on Computers and Communications, {ISCC} 2020, Rennes,
                  France, July 7-10, 2020},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ISCC50000.2020.9219702},
  doi          = {10.1109/ISCC50000.2020.9219702},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscc/JiangLY0LAH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ksem/LuJYLLHL20,
  author       = {Yue Lu and
                  Jianguo Jiang and
                  Min Yu and
                  Chao Liu and
                  Chaochao Liu and
                  Weiqing Huang and
                  Zhiqiang Lv},
  editor       = {Gang Li and
                  Heng Tao Shen and
                  Ye Yuan and
                  Xiaoyang Wang and
                  Huawen Liu and
                  Xiang Zhao},
  title        = {Depthwise Separable Convolutional Neural Network for Confidential
                  Information Analysis},
  booktitle    = {Knowledge Science, Engineering and Management - 13th International
                  Conference, {KSEM} 2020, Hangzhou, China, August 28-30, 2020, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12275},
  pages        = {450--461},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55393-7\_40},
  doi          = {10.1007/978-3-030-55393-7\_40},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ksem/LuJYLLHL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-06308,
  author       = {Alireza Shojaifar and
                  Samuel A. Fricker},
  title        = {SMEs Confidentiality Concerns for Security Information Sharing},
  journal      = {CoRR},
  volume       = {abs/2007.06308},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.06308},
  eprinttype    = {arXiv},
  eprint       = {2007.06308},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-06308.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/BuIK19,
  author       = {Lake Bu and
                  Mihailo Isakov and
                  Michel A. Kinsy},
  title        = {A secure and robust scheme for sharing confidential information in
                  IoT systems},
  journal      = {Ad Hoc Networks},
  volume       = {92},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.adhoc.2018.09.007},
  doi          = {10.1016/J.ADHOC.2018.09.007},
  timestamp    = {Fri, 05 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/BuIK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-cdt/BuIK19,
  author       = {Lake Bu and
                  Mihailo Isakov and
                  Michel A. Kinsy},
  title        = {{RASSS:} a hijack-resistant confidential information management scheme
                  for distributed systems},
  journal      = {{IET} Comput. Digit. Tech.},
  volume       = {13},
  number       = {3},
  pages        = {206--217},
  year         = {2019},
  url          = {https://doi.org/10.1049/iet-cdt.2018.5167},
  doi          = {10.1049/IET-CDT.2018.5167},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-cdt/BuIK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmhci/HaqueSRA19,
  author       = {S. M. Taiabul Haque and
                  Pratyasha Saha and
                  Muhammad Sajidur Rahman and
                  Syed Ishtiaque Ahmed},
  title        = {Of Ulti, 'hajano', and "Matachetar otanetak datam": Exploring Local
                  Practices of Exchanging Confidential and Sensitive Information in
                  Urban Bangladesh},
  journal      = {Proc. {ACM} Hum. Comput. Interact.},
  volume       = {3},
  number       = {{CSCW}},
  pages        = {173:1--173:22},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359275},
  doi          = {10.1145/3359275},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pacmhci/HaqueSRA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ShabbirSRA19,
  author       = {Aysha Shabbir and
                  Maryam Shabbir and
                  Muhammad Rizwan and
                  Fahad Ahmad},
  title        = {Ensuring the Confidentiality of Nuclear Information at Cloud Using
                  Modular Encryption Standard},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {2509898:1--2509898:16},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/2509898},
  doi          = {10.1155/2019/2509898},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ShabbirSRA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigir/OlteanuGRERLBOL19,
  author       = {Alexandra Olteanu and
                  Jean Garcia{-}Gathright and
                  Maarten de Rijke and
                  Michael D. Ekstrand and
                  Adam Roegiest and
                  Aldo Lipani and
                  Alex Beutel and
                  Ana Lucic and
                  Ana{-}Andreea Stoica and
                  Anubrata Das and
                  Asia Biega and
                  Bart Voorn and
                  Claudia Hauff and
                  Damiano Spina and
                  David D. Lewis and
                  Douglas W. Oard and
                  Emine Yilmaz and
                  Faegheh Hasibi and
                  Gabriella Kazai and
                  Graham McDonald and
                  Hinda Haned and
                  Iadh Ounis and
                  Ilse van der Linden and
                  Joris Baan and
                  Kamuela N. Lau and
                  Krisztian Balog and
                  Mahmoud F. Sayed and
                  Maria Panteli and
                  Mark Sanderson and
                  Matthew Lease and
                  Preethi Lahoti and
                  Toshihiro Kamishima},
  title        = {{FACTS-IR:} fairness, accountability, confidentiality, transparency,
                  and safety in information retrieval},
  journal      = {{SIGIR} Forum},
  volume       = {53},
  number       = {2},
  pages        = {20--43},
  year         = {2019},
  url          = {https://doi.org/10.1145/3458553.3458556},
  doi          = {10.1145/3458553.3458556},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigir/OlteanuGRERLBOL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ant/SilvaCVRSF19,
  author       = {Jes{\'{u}}s Silva and
                  Jenny Cubillos and
                  Jes{\'{u}}s Vargas Villa and
                  Ligia Romero and
                  Darwin Solano and
                  Claudia Fern{\'{a}}ndez},
  editor       = {Elhadi M. Shakshuki and
                  Ansar{-}Ul{-}Haque Yasar},
  title        = {Preservation of confidential information privacy and association rule
                  hiding for data mining: a bibliometric review},
  booktitle    = {The 10th International Conference on Ambient Systems, Networks and
                  Technologies {(ANT} 2019) / The 2nd International Conference on Emerging
                  Data and Industry 4.0 {(EDI40} 2019) / Affiliated Workshops, April
                  29 - May 2, 2019, Leuven, Belgium},
  series       = {Procedia Computer Science},
  volume       = {151},
  pages        = {1219--1224},
  publisher    = {Elsevier},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.procs.2019.04.175},
  doi          = {10.1016/J.PROCS.2019.04.175},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ant/SilvaCVRSF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ehealth2/SheikhtaheriHH19,
  author       = {Abbas Sheikhtaheri and
                  Nasim Hashemi and
                  Niyoosha{-}sadat Hashemi},
  editor       = {Dieter Hayn and
                  Alphons Eggerth and
                  G{\"{u}}nter Schreier},
  title        = {Performance of Hospitals in Protecting the Confidentiality and Information
                  Security of Patients in Health Information Departments},
  booktitle    = {dHealth 2019 - From eHealth to dHealth - Proceedings of the 13th Health
                  Informatics Meets Digital Health Conference, dHealth 2019, Vienna,
                  Austria, 28-29 May, 2019},
  series       = {Studies in Health Technology and Informatics},
  volume       = {260},
  pages        = {202--209},
  publisher    = {{IOS} Press},
  year         = {2019},
  url          = {https://doi.org/10.3233/978-1-61499-971-3-202},
  doi          = {10.3233/978-1-61499-971-3-202},
  timestamp    = {Mon, 14 Mar 2022 17:10:13 +0100},
  biburl       = {https://dblp.org/rec/conf/ehealth2/SheikhtaheriHH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/BaronH19,
  author       = {Lior Baron and
                  Tzipora Halevi},
  editor       = {Constantine Stephanidis},
  title        = {Feasibility Assessment of Cloud SaaS Enabled Collaboration and Information
                  Confidentiality for the Public Accounting Industry},
  booktitle    = {{HCI} International 2019 - Late Breaking Papers - 21st {HCI} International
                  Conference, {HCII} 2019, Orlando, FL, USA, July 26-31, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11786},
  pages        = {451--467},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30033-3\_35},
  doi          = {10.1007/978-3-030-30033-3\_35},
  timestamp    = {Thu, 05 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/BaronH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/medes/LivragaV19,
  author       = {Giovanni Livraga and
                  Marco Viviani},
  editor       = {Richard Chbeir and
                  Yannis Manolopoulos and
                  Sergio Ilarri and
                  Apostolos Papadopoulos},
  title        = {Data Confidentiality and Information Credibility in On-line Ecosystems},
  booktitle    = {11th International Conference on Management of Digital EcoSystems,
                  {MEDES} 2019, Limassol, Cyprus, November, 2019},
  pages        = {191--198},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3297662.3365829},
  doi          = {10.1145/3297662.3365829},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/medes/LivragaV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigir/OlteanuGRE19,
  author       = {Alexandra Olteanu and
                  Jean Garcia{-}Gathright and
                  Maarten de Rijke and
                  Michael D. Ekstrand},
  editor       = {Benjamin Piwowarski and
                  Max Chevalier and
                  {\'{E}}ric Gaussier and
                  Yoelle Maarek and
                  Jian{-}Yun Nie and
                  Falk Scholer},
  title        = {Workshop on Fairness, Accountability, Confidentiality, Transparency,
                  and Safety in Information Retrieval {(FACTS-IR)}},
  booktitle    = {Proceedings of the 42nd International {ACM} {SIGIR} Conference on
                  Research and Development in Information Retrieval, {SIGIR} 2019, Paris,
                  France, July 21-25, 2019},
  pages        = {1423--1425},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3331184.3331644},
  doi          = {10.1145/3331184.3331644},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigir/OlteanuGRE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-11934,
  author       = {Lake Bu and
                  Mihailo Isakov and
                  Michel A. Kinsy},
  title        = {A Secure and Robust Scheme for Sharing Confidential Information in
                  IoT Systems},
  journal      = {CoRR},
  volume       = {abs/1911.11934},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.11934},
  eprinttype    = {arXiv},
  eprint       = {1911.11934},
  timestamp    = {Tue, 03 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-11934.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/El-Rahman18,
  author       = {Sahar A. El{-}Rahman},
  title        = {A comparative analysis of image steganography based on {DCT} algorithm
                  and steganography tool to hide nuclear reactors confidential information},
  journal      = {Comput. Electr. Eng.},
  volume       = {70},
  pages        = {380--399},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.compeleceng.2016.09.001},
  doi          = {10.1016/J.COMPELECENG.2016.09.001},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/El-Rahman18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/WaqasAZL18,
  author       = {Muhammad Waqas and
                  Manzoor Ahmed and
                  Jiayi Zhang and
                  Yong Li},
  title        = {Confidential Information Ensurance through Physical Layer Security
                  in Device-to-Device Communication},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2018, Abu Dhabi,
                  United Arab Emirates, December 9-13, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/GLOCOM.2018.8647343},
  doi          = {10.1109/GLOCOM.2018.8647343},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/WaqasAZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ethos/Hussein17,
  author       = {Jamal Ali Hussein},
  title        = {{PROV-GTS:} a template-based {PROV} graph transformation system for
                  obscuring provenance confidential information},
  school       = {University of Southampton, {UK}},
  year         = {2017},
  url          = {https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.736711},
  timestamp    = {Tue, 05 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ethos/Hussein17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/VorakulpipatSRS17,
  author       = {Chalee Vorakulpipat and
                  Soontorn Sirapaisan and
                  Ekkachan Rattanalerdnusorn and
                  Visut Savangsuk},
  title        = {A Policy-Based Framework for Preserving Confidentiality in {BYOD}
                  Environments: {A} Review of Information Security Perspectives},
  journal      = {Secur. Commun. Networks},
  volume       = {2017},
  pages        = {2057260:1--2057260:11},
  year         = {2017},
  url          = {https://doi.org/10.1155/2017/2057260},
  doi          = {10.1155/2017/2057260},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/VorakulpipatSRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/ZhangTL17,
  author       = {Zhiyu Zhang and
                  Kah Chan Teh and
                  Kwok Hung Li},
  title        = {Distributed Optimization for Resilient Transmission of Confidential
                  Information in Interference Channels},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {66},
  number       = {1},
  pages        = {494--501},
  year         = {2017},
  url          = {https://doi.org/10.1109/TVT.2016.2536744},
  doi          = {10.1109/TVT.2016.2536744},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/ZhangTL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/Lin17,
  author       = {Yan{-}Xia Lin},
  title        = {Mining the Statistical Information of Confidential Data from Noise-Multiplied
                  Data},
  booktitle    = {15th {IEEE} Intl Conf on Dependable, Autonomic and Secure Computing,
                  15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf
                  on Big Data Intelligence and Computing and Cyber Science and Technology
                  Congress, DASC/PiCom/DataCom/CyberSciTech 2017, Orlando, FL, USA,
                  November 6-10, 2017},
  pages        = {1292--1297},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2017.208},
  doi          = {10.1109/DASC-PICOM-DATACOM-CYBERSCITEC.2017.208},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dasc/Lin17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/meco/GromovBG17,
  author       = {Aleksey Y. Gromov and
                  Aleksey I. Baranchikov and
                  Natalya N. Grinchenko},
  title        = {Simulation of business processes in the information systems containing
                  confidential information},
  booktitle    = {6th Mediterranean Conference on Embedded Computing, {MECO} 2017, Bar,
                  Montenegro, June 11-15, 2017},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/MECO.2017.7977156},
  doi          = {10.1109/MECO.2017.7977156},
  timestamp    = {Mon, 09 Aug 2021 14:54:01 +0200},
  biburl       = {https://dblp.org/rec/conf/meco/GromovBG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/medinfo/SaidRGJ17,
  author       = {Mohamed Ben Sa{\"{\i}}d and
                  Laurence Robel and
                  Bernard Golse and
                  Jean Philippe Ja{\"{\i}}s},
  editor       = {Adi V. Gundlapalli and
                  Marie{-}Christine Jaulent and
                  Dongsheng Zhao},
  title        = {Strengthening Data Confidentiality and Integrity Protection in the
                  Context of a Multi-Centric Information System Dedicated to Autism
                  Spectrum Disorder},
  booktitle    = {{MEDINFO} 2017: Precision Healthcare through Informatics - Proceedings
                  of the 16th World Congress on Medical and Health Informatics, Hangzhou,
                  China, 21-25 August 2017},
  series       = {Studies in Health Technology and Informatics},
  volume       = {245},
  pages        = {1133--1137},
  publisher    = {{IOS} Press},
  year         = {2017},
  url          = {https://doi.org/10.3233/978-1-61499-830-3-1133},
  doi          = {10.3233/978-1-61499-830-3-1133},
  timestamp    = {Wed, 03 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/medinfo/SaidRGJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mipro/VojkovicM17,
  author       = {Goran Vojkovic and
                  Melita Milenkovic},
  editor       = {Petar Biljanovic and
                  Marko Koricic and
                  Karolj Skala and
                  Tihana Galinac Grbac and
                  Marina Cicin{-}Sain and
                  Vlado Sruk and
                  Slobodan Ribaric and
                  Stjepan Gros and
                  Boris Vrdoljak and
                  Mladen Mauher and
                  Edvard Tijan and
                  Filip Hormot},
  title        = {Legal framework issues managing confidential business information
                  in the Republic of Croatia},
  booktitle    = {40th International Convention on Information and Communication Technology,
                  Electronics and Microelectronics, {MIPRO} 2017, Opatija, Croatia,
                  May 22-26, 2017},
  pages        = {1319--1323},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/MIPRO.2017.7973627},
  doi          = {10.23919/MIPRO.2017.7973627},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/mipro/VojkovicM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BiskupTZ17,
  author       = {Joachim Biskup and
                  Cornelia Tadros and
                  Jaouad Zarouali},
  title        = {Confidentiality enforcement by hybrid control of information flows},
  journal      = {CoRR},
  volume       = {abs/1707.08482},
  year         = {2017},
  url          = {http://arxiv.org/abs/1707.08482},
  eprinttype    = {arXiv},
  eprint       = {1707.08482},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BiskupTZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/WangZY16,
  author       = {Hui Wang and
                  Weiming Zhang and
                  Nenghai Yu},
  title        = {Protecting patient confidential information based on {ECG} reversible
                  data hiding},
  journal      = {Multim. Tools Appl.},
  volume       = {75},
  number       = {21},
  pages        = {13733--13747},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11042-015-2706-2},
  doi          = {10.1007/S11042-015-2706-2},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/WangZY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/GuptaC16,
  author       = {Nirupam Gupta and
                  Nikhil Chopra},
  title        = {Confidentiality in distributed average information consensus},
  booktitle    = {55th {IEEE} Conference on Decision and Control, {CDC} 2016, Las Vegas,
                  NV, USA, December 12-14, 2016},
  pages        = {6709--6714},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CDC.2016.7799302},
  doi          = {10.1109/CDC.2016.7799302},
  timestamp    = {Fri, 04 Mar 2022 13:29:43 +0100},
  biburl       = {https://dblp.org/rec/conf/cdc/GuptaC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/is/AbuadbbaK15,
  author       = {Alsharif Abuadbba and
                  Ibrahim Khalil},
  title        = {Wavelet based steganographic technique to protect household confidential
                  information and seal the transmitted smart grid readings},
  journal      = {Inf. Syst.},
  volume       = {53},
  pages        = {224--236},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.is.2014.09.004},
  doi          = {10.1016/J.IS.2014.09.004},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/is/AbuadbbaK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/JaskolkaKS15,
  author       = {Jason Jaskolka and
                  Ridha Kh{\'{e}}dri and
                  Khair Eddin Sabri},
  title        = {Investigative support for information confidentiality},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {6},
  number       = {4},
  pages        = {425--451},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12652-015-0289-4},
  doi          = {10.1007/S12652-015-0289-4},
  timestamp    = {Mon, 10 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jaihc/JaskolkaKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisis-spain/Martin-Fernandez15,
  author       = {Francisco Mart{\'{\i}}n{-}Fern{\'{a}}ndez and
                  Pino Caballero{-}Gil and
                  C{\'{a}}ndido Caballero{-}Gil},
  editor       = {{\'{A}}lvaro Herrero and
                  Bruno Baruque and
                  Javier Sedano and
                  H{\'{e}}ctor Quinti{\'{a}}n and
                  Emilio Corchado},
  title        = {Non-Interactive Authentication and Confidential Information Exchange
                  for Mobile Environments},
  booktitle    = {International Joint Conference - CISIS'15 and ICEUTE'15, 8th International
                  Conference on Computational Intelligence in Security for Information
                  Systems / 6th International Conference on EUropean Transnational Education,
                  Burgos, Spain, 15-17 June, 2015},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {369},
  pages        = {261--271},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19713-5\_23},
  doi          = {10.1007/978-3-319-19713-5\_23},
  timestamp    = {Fri, 12 Aug 2022 13:44:54 +0200},
  biburl       = {https://dblp.org/rec/conf/cisis-spain/Martin-Fernandez15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/ZhangLHY15,
  author       = {Haiyang Zhang and
                  Chunguo Li and
                  Yongming Huang and
                  Luxi Yang},
  title        = {Simultaneous Wireless Information and Power Transfer in a {MISO} Broadcast
                  Channel with Confidential Messages},
  booktitle    = {2015 {IEEE} Global Communications Conference, {GLOBECOM} 2015, San
                  Diego, CA, USA, December 6-10, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/GLOCOM.2014.7417829},
  doi          = {10.1109/GLOCOM.2014.7417829},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/ZhangLHY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifiptm/HusseinMS15,
  author       = {Jamal Ali Hussein and
                  Luc Moreau and
                  Vladimiro Sassone},
  editor       = {Christian Damsgaard Jensen and
                  Stephen Marsh and
                  Theo Dimitrakos and
                  Yuko Murayama},
  title        = {Obscuring Provenance Confidential Information via Graph Transformation},
  booktitle    = {Trust Management {IX} - 9th {IFIP} {WG} 11.11 International Conference,
                  {IFIPTM} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {454},
  pages        = {109--125},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18491-3\_8},
  doi          = {10.1007/978-3-319-18491-3\_8},
  timestamp    = {Sun, 02 Oct 2022 16:07:38 +0200},
  biburl       = {https://dblp.org/rec/conf/ifiptm/HusseinMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/medinfo/LiuaLCLC15,
  author       = {Hsiu{-}Chu Liua and
                  Hsing Li and
                  Hsin{-}Fei Chang and
                  Mei{-}Rou Lu and
                  Feng{-}Chuan Chen},
  editor       = {Indra Neil Sarkar and
                  Andrew Georgiou and
                  Paulo Mazzoncini de Azevedo Marques},
  title        = {Application of Barcoding to Reduce Error of Patient Identification
                  and to Increase Patient's Information Confidentiality of Test Tube
                  Labelling in a Psychiatric Teaching Hospital},
  booktitle    = {{MEDINFO} 2015: eHealth-enabled Health - Proceedings of the 15th World
                  Congress on Health and Biomedical Informatics, S{\~{a}}o Paulo, Brazil,
                  19-23 August 2015},
  series       = {Studies in Health Technology and Informatics},
  volume       = {216},
  pages        = {919},
  publisher    = {{IOS} Press},
  year         = {2015},
  url          = {https://doi.org/10.3233/978-1-61499-564-7-919},
  doi          = {10.3233/978-1-61499-564-7-919},
  timestamp    = {Wed, 03 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/medinfo/LiuaLCLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/sci/ChertovT15,
  author       = {Oleg Chertov and
                  Dan Tavrov},
  editor       = {Ronald R. Yager and
                  Marek Z. Reformat and
                  Naif Alajlan},
  title        = {Microfiles as a Potential Source of Confidential Information Leakage},
  booktitle    = {Intelligent Methods for Cyber Warfare},
  series       = {Studies in Computational Intelligence},
  volume       = {563},
  pages        = {87--114},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-08624-8\_4},
  doi          = {10.1007/978-3-319-08624-8\_4},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/sci/ChertovT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Bordenabe14,
  author       = {Nicol{\'{a}}s E. Bordenabe},
  title        = {Mesurer la confidentialit{\'{e}} avec des m{\'{e}}triques
                  de discernabilit{\'{e}}: d{\'{e}}finitions, m{\'{e}}canismes
                  et confidentialit{\'{e}} des informations li{\'{e}}es {\`{a}}
                  la localisation. (Measuring Privacy with Distinguishability Metrics:
                  Definitions, Mechanisms and Application to Location Privacy)},
  school       = {{\'{E}}cole Polytechnique, Palaiseau, France},
  year         = {2014},
  url          = {https://tel.archives-ouvertes.fr/tel-01098088},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Bordenabe14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/hij/HunterEW14,
  author       = {Inga M. Hunter and
                  Gael Haining Ede and
                  Richard J. Whiddett},
  title        = {Increased electronic information sharing by sexual health services:
                  Confidentiality and consent},
  journal      = {Health Informatics J.},
  volume       = {20},
  number       = {1},
  pages        = {3--12},
  year         = {2014},
  url          = {https://doi.org/10.1177/1460458212475140},
  doi          = {10.1177/1460458212475140},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/hij/HunterEW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/embc/Al-DmourAN14,
  author       = {Hayat Al{-}Dmour and
                  Ahmed Al{-}Ani and
                  Hung T. Nguyen},
  title        = {An efficient steganography method for hiding patient confidential
                  information},
  booktitle    = {36th Annual International Conference of the {IEEE} Engineering in
                  Medicine and Biology Society, {EMBC} 2014, Chicago, IL, USA, August
                  26-30, 2014},
  pages        = {222--225},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/EMBC.2014.6943569},
  doi          = {10.1109/EMBC.2014.6943569},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/embc/Al-DmourAN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fnc/JaskolkaKS14,
  author       = {Jason Jaskolka and
                  Ridha Kh{\'{e}}dri and
                  Khair Eddin Sabri},
  title        = {Investigative Support for Information Confidentiality Part {II:} Applications
                  in Cryptanalysis and Digital Forensics},
  booktitle    = {The 9th International Conference on Future Networks and Communications
                  (FNC'14) / The 11th International Conference on Mobile Systems and
                  Pervasive Computing (MobiSPC'14) / Affiliated Workshops, August 17-20,
                  2014, Niagara Falls, Canada},
  series       = {Procedia Computer Science},
  volume       = {34},
  pages        = {266--275},
  publisher    = {Elsevier},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.procs.2014.07.022},
  doi          = {10.1016/J.PROCS.2014.07.022},
  timestamp    = {Thu, 08 Jul 2021 16:04:01 +0200},
  biburl       = {https://dblp.org/rec/conf/fnc/JaskolkaKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fnc/JaskolkaKS14a,
  author       = {Jason Jaskolka and
                  Ridha Kh{\'{e}}dri and
                  Khair Eddin Sabri},
  title        = {Investigative Support for Information Confidentiality Part {I:} Detecting
                  Confidential Information Leakage via Protocol-based Covert Channels},
  booktitle    = {The 9th International Conference on Future Networks and Communications
                  (FNC'14) / The 11th International Conference on Mobile Systems and
                  Pervasive Computing (MobiSPC'14) / Affiliated Workshops, August 17-20,
                  2014, Niagara Falls, Canada},
  series       = {Procedia Computer Science},
  volume       = {34},
  pages        = {276--285},
  publisher    = {Elsevier},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.procs.2014.07.023},
  doi          = {10.1016/J.PROCS.2014.07.023},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fnc/JaskolkaKS14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/DaiM14,
  author       = {Bin Dai and
                  Zheng Ma},
  title        = {Feedback enhances the security of degraded broadcast channels with
                  confidential messages and causal channel state information},
  booktitle    = {2014 {IEEE} Information Theory Workshop, {ITW} 2014, Hobart, Tasmania,
                  Australia, November 2-5, 2014},
  pages        = {411--415},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ITW.2014.6970864},
  doi          = {10.1109/ITW.2014.6970864},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itw/DaiM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tbe/IbaidaK13,
  author       = {Ayman Ibaida and
                  Ibrahim Khalil},
  title        = {Wavelet-Based {ECG} Steganography for Protecting Patient Confidential
                  Information in Point-of-Care Systems},
  journal      = {{IEEE} Trans. Biomed. Eng.},
  volume       = {60},
  number       = {12},
  pages        = {3322--3330},
  year         = {2013},
  url          = {https://doi.org/10.1109/TBME.2013.2264539},
  doi          = {10.1109/TBME.2013.2264539},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tbe/IbaidaK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/GamageRMC13,
  author       = {Thoshitha T. Gamage and
                  Thomas P. Roth and
                  Bruce M. McMillin and
                  Mariesa L. Crow},
  title        = {Mitigating Event Confidentiality Violations in Smart Grids: An Information
                  Flow Security-Based Approach},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {4},
  number       = {3},
  pages        = {1227--1234},
  year         = {2013},
  url          = {https://doi.org/10.1109/TSG.2013.2243924},
  doi          = {10.1109/TSG.2013.2243924},
  timestamp    = {Fri, 09 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsg/GamageRMC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/SergeevMB13,
  author       = {Ivan Sergeev and
                  Muriel M{\'{e}}dard and
                  Jo{\~{a}}o Barros},
  editor       = {Joe Senftle and
                  Mike Beltrani and
                  Kari Karwedsky},
  title        = {Melting Pad: An Efficiently Decodable Coding Scheme for Information
                  Theoretic Confidentiality},
  booktitle    = {32th {IEEE} Military Communications Conference, {MILCOM} 2013, San
                  Diego, CA, USA, November 18-20, 2013},
  pages        = {458--463},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/MILCOM.2013.85},
  doi          = {10.1109/MILCOM.2013.85},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/SergeevMB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spawc/SchaeferPB13,
  author       = {Rafael F. Schaefer and
                  H. Vincent Poor and
                  Holger Boche},
  title        = {{MIMO} Gaussian broadcast channels with private and confidential messages
                  and with receiver side information},
  booktitle    = {14th {IEEE} Workshop on Signal Processing Advances in Wireless Communications,
                  {SPAWC} 2013, Darmstadt, Germany, June 16-19, 2013},
  pages        = {659--663},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SPAWC.2013.6612132},
  doi          = {10.1109/SPAWC.2013.6612132},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/spawc/SchaeferPB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YooPK12,
  author       = {Sang Guun Yoo and
                  Keunyoung Park and
                  Juho Kim},
  title        = {Confidential information protection system for mobile devices},
  journal      = {Secur. Commun. Networks},
  volume       = {5},
  number       = {12},
  pages        = {1452--1461},
  year         = {2012},
  url          = {https://doi.org/10.1002/sec.516},
  doi          = {10.1002/SEC.516},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YooPK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/IshiiRU12,
  author       = {Junya Ishii and
                  Afiza Razali and
                  Ryuya Uda},
  editor       = {Leonard Barolli and
                  Tomoya Enokido and
                  Fatos Xhafa and
                  Makoto Takizawa},
  title        = {Confidential Information Poisoning Methods by Considering the Information
                  Length in Electronic Portable Devices},
  booktitle    = {26th International Conference on Advanced Information Networking and
                  Applications Workshops, {WAINA} 2012, Fukuoka, Japan, March 26-29,
                  2012},
  pages        = {78--84},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/WAINA.2012.177},
  doi          = {10.1109/WAINA.2012.177},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/IshiiRU12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsec/NishikawaOM12,
  author       = {Kiyoshi Nishikawa and
                  Kenji Oki and
                  Akihiko Matsuo},
  editor       = {Karl R. P. H. Leung and
                  Pornsiri Muenchaisri},
  title        = {SaaS Application Framework Using Information Gateway Enabling Cloud
                  Service with Data Confidentiality},
  booktitle    = {19th Asia-Pacific Software Engineering Conference, {APSEC} 2012, Hong
                  Kong, China, December 4-7, 2012},
  pages        = {334--337},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/APSEC.2012.133},
  doi          = {10.1109/APSEC.2012.133},
  timestamp    = {Sun, 08 Aug 2021 01:40:48 +0200},
  biburl       = {https://dblp.org/rec/conf/apsec/NishikawaOM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/CohenA12,
  author       = {Jason C. Cohen and
                  Subrata Acharya},
  title        = {Incorporating hardware trust mechanisms in Apache Hadoop: To improve
                  the integrity and confidentiality of data in a distributed Apache
                  Hadoop file system: An information technology infrastructure and software
                  approach},
  booktitle    = {Workshops Proceedings of the Global Communications Conference, {GLOBECOM}
                  2012, 3-7 December 2012, Anaheim, California, {USA}},
  pages        = {769--774},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/GLOCOMW.2012.6477672},
  doi          = {10.1109/GLOCOMW.2012.6477672},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/CohenA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/DaiHVLZ12,
  author       = {Bin Dai and
                  Jiehua Hong and
                  A. J. Han Vinck and
                  Yuan Luo and
                  Zhuojun Zhuang},
  title        = {Degraded broadcast channel with noncausal side information, confidential
                  messages and noiseless feedback},
  booktitle    = {Proceedings of the 2012 {IEEE} International Symposium on Information
                  Theory, {ISIT} 2012, Cambridge, MA, USA, July 1-6, 2012},
  pages        = {438--442},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISIT.2012.6284226},
  doi          = {10.1109/ISIT.2012.6284226},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/DaiHVLZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/RamaFB12,
  author       = {Sobhana Rama and
                  Stephen Flowerday and
                  Duane Boucher},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Information confidentiality and the Chinese Wall Model in Government
                  tender fraud},
  booktitle    = {2012 Information Security for South Africa, Balalaika Hotel, Sandton,
                  Johannesburg, South Africa, August 15-17, 2012},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISSA.2012.6320438},
  doi          = {10.1109/ISSA.2012.6320438},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/RamaFB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/0001B12,
  author       = {Johannes Braun and
                  Johannes Buchmann},
  editor       = {Albert Levi and
                  Mohamad Badra and
                  Matteo Cesana and
                  Mona Ghassemian and
                  {\"{O}}zg{\"{u}}r G{\"{u}}rb{\"{u}}z and
                  Nafa{\^{a}} Jabeur and
                  Marek Klonowski and
                  Antonio Ma{\~{n}}a and
                  Susana Sargento and
                  Sherali Zeadally},
  title        = {Perfect Confidentiality Network: {A} Solution for Information Theoretically
                  Secure Key Agreement},
  booktitle    = {5th International Conference on New Technologies, Mobility and Security,
                  Istanbul, Turkey, {NTMS} 2012, May 7-10, 2012},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/NTMS.2012.6208676},
  doi          = {10.1109/NTMS.2012.6208676},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ntms/0001B12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/worldcis/FernandoZ12,
  author       = {Des Fernando and
                  Pavol Zavarsky},
  title        = {Secure decommissioning of confidential electronically stored information
                  {(CESI):} {A} framework for managing {CESI} in the disposal phaseas
                  needed},
  booktitle    = {2012 World Congress on Internet Security, WorldCIS 2012, Guelph, ON,
                  Canada, June 10-12, 2012},
  pages        = {218--222},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6280181/},
  timestamp    = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/worldcis/FernandoZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1201-2859,
  author       = {Bin Dai},
  title        = {Degraded Broadcast Channel with Side Information, Confidential Messages
                  and Noiseless Feedback},
  journal      = {CoRR},
  volume       = {abs/1201.2859},
  year         = {2012},
  url          = {http://arxiv.org/abs/1201.2859},
  eprinttype    = {arXiv},
  eprint       = {1201.2859},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1201-2859.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1206-4123,
  author       = {Mingqiang Li},
  title        = {On the Confidentiality of Information Dispersal Algorithms and Their
                  Erasure Codes},
  journal      = {CoRR},
  volume       = {abs/1206.4123},
  year         = {2012},
  url          = {http://arxiv.org/abs/1206.4123},
  eprinttype    = {arXiv},
  eprint       = {1206.4123},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1206-4123.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/allerton/HayashiM11,
  author       = {Masahito Hayashi and
                  Ryutaroh Matsumoto},
  title        = {Universally attainable error and information exponents, and equivocation
                  rate for the broadcast channels with confidential messages},
  booktitle    = {49th Annual Allerton Conference on Communication, Control, and Computing,
                  Allerton 2011, Allerton Park {\&} Retreat Center, Monticello,
                  IL, USA, 28-30 September, 2011},
  pages        = {439--444},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/Allerton.2011.6120200},
  doi          = {10.1109/ALLERTON.2011.6120200},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/allerton/HayashiM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/KerschbaumSK11,
  author       = {Florian Kerschbaum and
                  Jens Str{\"{u}}ker and
                  Thomas G. Koslowski},
  editor       = {Dennis F. Galletta and
                  Ting{-}Peng Liang},
  title        = {Confidential Information-Sharing for Automated Sustainability Benchmarks},
  booktitle    = {Proceedings of the International Conference on Information Systems,
                  {ICIS} 2011, Shanghai, China, December 4-7, 2011},
  publisher    = {Association for Information Systems},
  year         = {2011},
  url          = {http://aisel.aisnet.org/icis2011/proceedings/breakthroughideas/4},
  timestamp    = {Sun, 25 Oct 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icis/KerschbaumSK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/tf/Sherizen11,
  author       = {Sanford Sherizen},
  editor       = {Rebecca Herold},
  title        = {Management Compliance: Confidential Information},
  booktitle    = {Encyclopedia of Information Assurance},
  publisher    = {Taylor {\&} Francis},
  year         = {2011},
  url          = {https://doi.org/10.1081/E-EIA-120046585},
  doi          = {10.1081/E-EIA-120046585},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/tf/Sherizen11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1101-0345,
  author       = {Yuya Dan},
  title        = {Diffusion of Confidential Information on Networks},
  journal      = {CoRR},
  volume       = {abs/1101.0345},
  year         = {2011},
  url          = {http://arxiv.org/abs/1101.0345},
  eprinttype    = {arXiv},
  eprint       = {1101.0345},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1101-0345.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1103-3332,
  author       = {Raju Singh and
                  A. K. Vatsa},
  title        = {Confidentiality {\&} Authentication Mechanism for Biometric Information
                  Transmitted over Low Bandwidth {\&} Unreliable channel},
  journal      = {CoRR},
  volume       = {abs/1103.3332},
  year         = {2011},
  url          = {http://arxiv.org/abs/1103.3332},
  eprinttype    = {arXiv},
  eprint       = {1103.3332},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1103-3332.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1104-4285,
  author       = {Masahito Hayashi and
                  Ryutaroh Matsumoto},
  title        = {Universally Attainable Error and Information Exponents for the Broadcast
                  Channels with Confidential Messages},
  journal      = {CoRR},
  volume       = {abs/1104.4285},
  year         = {2011},
  url          = {http://arxiv.org/abs/1104.4285},
  eprinttype    = {arXiv},
  eprint       = {1104.4285},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1104-4285.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/CristofaroK10,
  author       = {Emiliano De Cristofaro and
                  Jihye Kim},
  title        = {Some Like It Private: Sharing Confidential Information Based on Oblivious
                  Authorization},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {8},
  number       = {4},
  pages        = {18--24},
  year         = {2010},
  url          = {https://doi.org/10.1109/MSP.2010.91},
  doi          = {10.1109/MSP.2010.91},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/CristofaroK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Slavkovic10,
  author       = {Aleksandra B. Slavkovic},
  title        = {Partial Information Releases for Confidential Contingency Table Entries:
                  Present and Future Research Efforts},
  journal      = {J. Priv. Confidentiality},
  volume       = {1},
  number       = {2},
  year         = {2010},
  url          = {https://doi.org/10.29012/jpc.v1i2.577},
  doi          = {10.29012/JPC.V1I2.577},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Slavkovic10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/WaldoLC10,
  author       = {James Waldo and
                  Herbert S. Lin and
                  Lawrence H. Cox},
  title        = {Thinking About Privacy: Chapter 1 of "Engaging Privacy and Information
                  Technology in a Digital Age"},
  journal      = {J. Priv. Confidentiality},
  volume       = {2},
  number       = {1},
  year         = {2010},
  url          = {https://doi.org/10.29012/jpc.v2i1.581},
  doi          = {10.29012/JPC.V2I1.581},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/WaldoLC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/WaldoLM10,
  author       = {James Waldo and
                  Herbert S. Lin and
                  Lynette I. Millett},
  title        = {Engaging Privacy and Information Technology in a Digital Age: Executive
                  Summary},
  journal      = {J. Priv. Confidentiality},
  volume       = {2},
  number       = {1},
  year         = {2010},
  url          = {https://doi.org/10.29012/jpc.v2i1.580},
  doi          = {10.29012/JPC.V2I1.580},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/WaldoLM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/NabiNTHAA10,
  author       = {Syed Irfan Nabi and
                  Syed Waqar Nabi and
                  Syed Awais Ahmed Tipu and
                  Bushra Haqqi and
                  Zahra Abid and
                  Khaled Alghathbar},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {Data Confidentiality and Integrity Issues and Role of Information
                  Security Management Standard, Policies and Practices - An Empirical
                  Study of Telecommunication Industry in Pakistan},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {47--56},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_6},
  doi          = {10.1007/978-3-642-17610-4\_6},
  timestamp    = {Sat, 30 Sep 2023 09:41:06 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/NabiNTHAA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/AccorsiW10,
  author       = {Rafael Accorsi and
                  Claus Wonnemann},
  editor       = {Jorge Cu{\'{e}}llar and
                  Gilles Barthe and
                  Alexander Pretschner},
  title        = {InDico: Information Flow Analysis of Business Processes for Confidentiality
                  Requirements},
  booktitle    = {Security and Trust Management - 6th International Workshop, {STM}
                  2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6710},
  pages        = {194--209},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-22444-7\_13},
  doi          = {10.1007/978-3-642-22444-7\_13},
  timestamp    = {Sat, 19 Oct 2019 20:20:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/AccorsiW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wowmom/Barbeau10,
  author       = {Michel Barbeau},
  title        = {Assessment of the true risks to the protection of confidential information
                  in the wireless home and office environment},
  booktitle    = {11th {IEEE} International Symposium on a World of Wireless, Mobile
                  and Multimedia Networks, {WOWMOM} 2010, Montreal, QC, Canada, 14-17
                  June, 2010},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/WOWMOM.2010.5534940},
  doi          = {10.1109/WOWMOM.2010.5534940},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wowmom/Barbeau10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Borders09,
  author       = {Kevin Borders},
  title        = {Protecting Confidential Information from Malicious Software},
  school       = {University of Michigan, {USA}},
  year         = {2009},
  url          = {https://hdl.handle.net/2027.42/63795},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Borders09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/de/Fischmann2008,
  author       = {Matthias Fischmann},
  title        = {Data confidentiality and reputation schemes in distributed information
                  systems},
  school       = {Humboldt University of Berlin, Unter den Linden, Germany},
  year         = {2008},
  url          = {http://edoc.hu-berlin.de/dissertationen/fischmann-matthias-2008-05-23/PDF/fischmann.pdf},
  urn          = {urn:nbn:de:kobv:11-10092394},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/de/Fischmann2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csjm/Papanaga08,
  author       = {Victor Papanaga},
  title        = {Confidentiality and Security in Medical Information Systems},
  journal      = {Comput. Sci. J. Moldova},
  volume       = {16},
  number       = {3},
  pages        = {442--453},
  year         = {2008},
  url          = {http://www.math.md/publications/csjm/issues/v16-n3/9974/},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csjm/Papanaga08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mansci/LiZ08,
  author       = {Lode Li and
                  Hongtao Zhang},
  title        = {Confidentiality and Information Sharing in Supply Chain Coordination},
  journal      = {Manag. Sci.},
  volume       = {54},
  number       = {8},
  pages        = {1467--1481},
  year         = {2008},
  url          = {https://doi.org/10.1287/mnsc.1070.0851},
  doi          = {10.1287/MNSC.1070.0851},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mansci/LiZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/BaekKSL08,
  author       = {Eunju Baek and
                  Yeog Kim and
                  Jinwon Sung and
                  Sangjin Lee},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {The design of framework for detecting an insider's leak of confidential
                  information},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {14},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/e-forensics.2008.2658},
  doi          = {10.4108/E-FORENSICS.2008.2658},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/BaekKSL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ZhangSCJMY08,
  author       = {Hui Zhang and
                  Abhishek B. Sharma and
                  Haifeng Chen and
                  Guofei Jiang and
                  Xiaoqiao Meng and
                  Kenji Yoshihira},
  title        = {Enabling Information Confidentiality in Publish/Subscribe Overlay
                  Services},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2008, Beijing, China, 19-23 May 2008},
  pages        = {5624--5628},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICC.2008.1054},
  doi          = {10.1109/ICC.2008.1054},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/ZhangSCJMY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipaw/NagappanV08,
  author       = {Meiyappan Nagappan and
                  Mladen A. Vouk},
  editor       = {Juliana Freire and
                  David Koop and
                  Luc Moreau},
  title        = {A Model for Sharing of Confidential Provenance Information in a Query
                  Based System},
  booktitle    = {Provenance and Annotation of Data and Processes, Second International
                  Provenance and Annotation Workshop, {IPAW} 2008, Salt Lake City, UT,
                  USA, June 17-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5272},
  pages        = {62--69},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89965-5\_8},
  doi          = {10.1007/978-3-540-89965-5\_8},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ipaw/NagappanV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WangLLC08,
  author       = {XiaoFeng Wang and
                  Zhuowei Li and
                  Ninghui Li and
                  Jong Youl Choi},
  title        = {{PRECIP:} Towards Practical and Retrofittable Confidential Information
                  Protection},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2008, San Diego, California, USA, 10th February - 13th February
                  2008},
  publisher    = {The Internet Society},
  year         = {2008},
  url          = {https://www.ndss-symposium.org/ndss2008/precip-towards-practical-and-retrofittable-confidential-information-protection/},
  timestamp    = {Wed, 02 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/WangLLC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securware/GoudaloS08,
  author       = {Wilson Goudalo and
                  Dominique Seret},
  editor       = {Andr{\'{e}} Cotton and
                  Oana Dini and
                  Antonio Fernandez G{\'{o}}mez{-}Skarmeta and
                  Mihaela Ion and
                  Manuela Popescu and
                  Masaru Takesue},
  title        = {Toward the Engineering of Security of Information Systems {(ESIS):}
                  {UML} and the {IS} Confidentiality},
  booktitle    = {Proceedings of the Second International Conference on Emerging Security
                  Information, Systems and Technologies, {SECURWARE} 2008, August 25-31,
                  2008, Cap Esterel, France},
  pages        = {248--256},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SECURWARE.2008.66},
  doi          = {10.1109/SECURWARE.2008.66},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securware/GoudaloS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/LeGuernic07,
  author       = {Gurvan Le Guernic},
  title        = {Confidentiality Enforcement Using Dynamic Information Flow Analyses},
  school       = {Kansas State University, United States of America},
  year         = {2007},
  url          = {https://tel.archives-ouvertes.fr/tel-00198621},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/LeGuernic07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/geb/DaughetyR07,
  author       = {Andrew F. Daughety and
                  Jennifer F. Reinganum},
  title        = {Competition and confidentiality: Signaling quality in a duopoly when
                  there is universal private information},
  journal      = {Games Econ. Behav.},
  volume       = {58},
  number       = {1},
  pages        = {94--120},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.geb.2006.03.001},
  doi          = {10.1016/J.GEB.2006.03.001},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/geb/DaughetyR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijhisi/LendingD07,
  author       = {Diane Lending and
                  Thomas W. Dillon},
  title        = {The Effects of Confidentiality on Nursing Self-Efficacy with Information
                  Systems},
  journal      = {Int. J. Heal. Inf. Syst. Informatics},
  volume       = {2},
  number       = {3},
  pages        = {49--64},
  year         = {2007},
  url          = {https://doi.org/10.4018/jhisi.2007070105},
  doi          = {10.4018/JHISI.2007070105},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijhisi/LendingD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ior/NunezGG07,
  author       = {Manuel A. Nunez and
                  Robert S. Garfinkel and
                  Ram D. Gopal},
  title        = {Stochastic Protection of Confidential Information in Databases: {A}
                  Hybrid of Data Perturbation and Query Restriction},
  journal      = {Oper. Res.},
  volume       = {55},
  number       = {5},
  pages        = {890--908},
  year         = {2007},
  url          = {https://doi.org/10.1287/opre.1070.0407},
  doi          = {10.1287/OPRE.1070.0407},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ior/NunezGG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/SloaneLS07,
  author       = {Elliot Sloane and
                  Gondy Leroy and
                  Steven D. Sheetz},
  editor       = {John A. Hoxmeier and
                  Stephen C. Hayne},
  title        = {An Integrated Social Actor and Service Oriented Architecture {(SOA)}
                  Approach for Improved Electronic Health Record {(EHR)} Privacy and
                  Confidentiality in the {US} National Healthcare Information Network
                  {(NHIN)}},
  booktitle    = {Reaching New Heights. 13th Americas Conference on Information Systems,
                  {AMCIS} 2007, Keystone, Colorado, USA, August 9-12, 2007},
  pages        = {366},
  publisher    = {Association for Information Systems},
  year         = {2007},
  url          = {http://aisel.aisnet.org/amcis2007/366},
  timestamp    = {Thu, 26 Nov 2020 16:35:40 +0100},
  biburl       = {https://dblp.org/rec/conf/amcis/SloaneLS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wecwis/IkawaK07,
  author       = {Yohei Ikawa and
                  Hiroshi Kanayama},
  title        = {A New Document Masking Approach for Removing Confidential Information},
  booktitle    = {9th {IEEE} International Conference on E-Commerce Technology {(CEC}
                  2007) / 4th {IEEE} International Conference on Enterprise Computing,
                  E-Commerce and E-Services {(EEE} 2007), 23-26 July 2007, National
                  Center of Sciences, Tokyo, Japan},
  pages        = {107--114},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/CEC-EEE.2007.8},
  doi          = {10.1109/CEC-EEE.2007.8},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wecwis/IkawaK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/sci/LongpreK07,
  author       = {Luc Longpr{\'{e}} and
                  Vladik Kreinovich},
  editor       = {Nadia Nedjah and
                  Ajith Abraham and
                  Luiza de Macedo Mourelle},
  title        = {How to Efficiently Process Uncertainty within a Cyberinfrastructure
                  without Sacrificing Privacy and Confidentiality},
  booktitle    = {Computational Intelligence in Information Assurance and Security},
  series       = {Studies in Computational Intelligence},
  volume       = {57},
  pages        = {155--173},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71078-3\_6},
  doi          = {10.1007/978-3-540-71078-3\_6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/sci/LongpreK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnis/WangA06,
  author       = {Bei Wang and
                  Jim Alves{-}Foss},
  editor       = {Sanguthevar Rajasekaran},
  title        = {An {MSLS-EMM} for enforcing confidentiality in malicious environments},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {126--131},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Fri, 26 Jan 2007 13:40:33 +0100},
  biburl       = {https://dblp.org/rec/conf/cnis/WangA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecai/OrenNP06,
  author       = {Nir Oren and
                  Timothy J. Norman and
                  Alun D. Preece},
  editor       = {Gerhard Brewka and
                  Silvia Coradeschi and
                  Anna Perini and
                  Paolo Traverso},
  title        = {Arguing with Confidential Information},
  booktitle    = {{ECAI} 2006, 17th European Conference on Artificial Intelligence,
                  August 29 - September 1, 2006, Riva del Garda, Italy, Including Prestigious
                  Applications of Intelligent Systems {(PAIS} 2006), Proceedings},
  series       = {Frontiers in Artificial Intelligence and Applications},
  volume       = {141},
  pages        = {280--284},
  publisher    = {{IOS} Press},
  year         = {2006},
  url          = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=1691},
  timestamp    = {Tue, 13 Mar 2012 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecai/OrenNP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/datamine/FienbergS05,
  author       = {Stephen E. Fienberg and
                  Aleksandra B. Slavkovic},
  title        = {Preserving the Confidentiality of Categorical Statistical Data Bases
                  When Releasing Information for Association Rules},
  journal      = {Data Min. Knowl. Discov.},
  volume       = {11},
  number       = {2},
  pages        = {155--180},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10618-005-0010-x},
  doi          = {10.1007/S10618-005-0010-X},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/datamine/FienbergS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/datamine/Mateo-SanzDS05,
  author       = {Josep Maria Mateo{-}Sanz and
                  Josep Domingo{-}Ferrer and
                  Francesc Seb{\'{e}}},
  title        = {Probabilistic Information Loss Measures in Confidentiality Protection
                  of Continuous Microdata},
  journal      = {Data Min. Knowl. Discov.},
  volume       = {11},
  number       = {2},
  pages        = {181--193},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10618-005-0011-9},
  doi          = {10.1007/S10618-005-0011-9},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/datamine/Mateo-SanzDS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/NaliAM05,
  author       = {Deholo Nali and
                  Carlisle M. Adams and
                  Ali Miri},
  editor       = {Jianying Zhou and
                  Javier L{\'{o}}pez and
                  Robert H. Deng and
                  Feng Bao},
  title        = {Time-Based Release of Confidential Information in Hierarchical Settings},
  booktitle    = {Information Security, 8th International Conference, {ISC} 2005, Singapore,
                  September 20-23, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3650},
  pages        = {29--43},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11556992\_3},
  doi          = {10.1007/11556992\_3},
  timestamp    = {Thu, 29 Aug 2019 08:10:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/NaliAM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BiskupB04,
  author       = {Joachim Biskup and
                  Piero A. Bonatti},
  title        = {Controlled query evaluation for enforcing confidentiality in complete
                  information systems},
  journal      = {Int. J. Inf. Sec.},
  volume       = {3},
  number       = {1},
  pages        = {14--27},
  year         = {2004},
  url          = {https://doi.org/10.1007/s10207-004-0032-1},
  doi          = {10.1007/S10207-004-0032-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BiskupB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/HuiCPYTCC04,
  author       = {Lucas Chi Kwong Hui and
                  Kam{-}Pui Chow and
                  Kevin K. H. Pun and
                  Siu{-}Ming Yiu and
                  Wai Wan Tsang and
                  C. F. Chong and
                  H. W. Chan},
  title        = {Risk Management of Corporate Confidential Information in Digital Form},
  booktitle    = {28th International Computer Software and Applications Conference {(COMPSAC}
                  2004), Design and Assessment of Trustworthy Software-Based Systems,
                  27-30 September 2004, Hong Kong, China, Proceedings},
  pages        = {88--89},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/CMPSAC.2004.1342810},
  doi          = {10.1109/CMPSAC.2004.1342810},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/HuiCPYTCC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/TrutaFC03,
  author       = {Traian Marius Truta and
                  Farshad Fotouhi and
                  Daniel C. Barth{-}Jones},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Paul F. Syverson},
  title        = {Privacy and confidentiality management for the microaggregation disclosure
                  control method: disclosure risk and information loss measures},
  booktitle    = {Proceedings of the 2003 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2003, Washington, DC, USA, October 30, 2003},
  pages        = {21--30},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/1005140.1005144},
  doi          = {10.1145/1005140.1005144},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/TrutaFC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/MontHS03,
  author       = {Marco Casassa Mont and
                  Keith Harrison and
                  Martin Sadler},
  editor       = {Guszt{\'{a}}v Hencsey and
                  Bebo White and
                  Yih{-}Farn Robin Chen and
                  L{\'{a}}szl{\'{o}} Kov{\'{a}}cs and
                  Steve Lawrence},
  title        = {The {HP} time vault service: exploiting {IBE} for timed release of
                  confidential information},
  booktitle    = {Proceedings of the Twelfth International World Wide Web Conference,
                  {WWW} 2003, Budapest, Hungary, May 20-24, 2003},
  pages        = {160--169},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/775152.775175},
  doi          = {10.1145/775152.775175},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/www/MontHS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ClaytonD02,
  author       = {Richard Clayton and
                  George Danezis},
  editor       = {Fabien A. P. Petitcolas},
  title        = {Chaffinch: Confidentiality in the Face of Legal Threats},
  booktitle    = {Information Hiding, 5th International Workshop, {IH} 2002, Noordwijkerhout,
                  The Netherlands, October 7-9, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2578},
  pages        = {70--86},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36415-3\_5},
  doi          = {10.1007/3-540-36415-3\_5},
  timestamp    = {Sun, 02 Oct 2022 16:07:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ClaytonD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ads/KarrLSHKL02,
  author       = {Alan F. Karr and
                  Jaeyong Lee and
                  Ashish P. Sanil and
                  Joel Hernandez and
                  Sousan Karimi and
                  Karen Litwin},
  editor       = {William J. McIver Jr. and
                  Ahmed K. Elmagarmid},
  title        = {Web-Based Systems that Disseminate Information from Databases but
                  Protect Confidentiality},
  booktitle    = {Advances in Digital Government - Technology, Human Factors, and Policy},
  series       = {Advances in Database Systems},
  volume       = {26},
  pages        = {181--196},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/0-306-47374-7\_11},
  doi          = {10.1007/0-306-47374-7\_11},
  timestamp    = {Tue, 16 May 2017 14:24:24 +0200},
  biburl       = {https://dblp.org/rec/series/ads/KarrLSHKL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic/ChadwickNMM01,
  author       = {David W. Chadwick and
                  John P. New and
                  D. M. McDowall and
                  Darren P. Mundy},
  editor       = {Peter Graham and
                  Muthucumaru Maheswaran and
                  M. Rasit Eskicioglu},
  title        = {Providing Secure Access to Confidential Patient Information Detailing
                  Diabetic Condition},
  booktitle    = {Proceedings of the International Conference on Internet Computing,
                  {IC} 2001, Las Vegas, Nevada, USA, June 25-28, 2001},
  pages        = {535--542},
  publisher    = {{CSREA} Press},
  year         = {2001},
  timestamp    = {Thu, 09 Feb 2017 09:59:20 +0100},
  biburl       = {https://dblp.org/rec/conf/ic/ChadwickNMM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmi/PatelAS00,
  author       = {Vimla L. Patel and
                  Jos{\'{e}} F. Arocha and
                  Edward H. Shortliffe},
  title        = {Cognitive models in training health professionals to protect patients'
                  confidential information},
  journal      = {Int. J. Medical Informatics},
  volume       = {60},
  number       = {2},
  pages        = {143--150},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1386-5056(00)00114-3},
  doi          = {10.1016/S1386-5056(00)00114-3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmi/PatelAS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/YiS00,
  author       = {Xun Yi and
                  Chee Kheong Siew},
  title        = {Software Agent-Mediated Confidential Information Gathering System},
  booktitle    = {Seventh International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2000, Iwate, Japan, July 4-7, 2000},
  pages        = {523--528},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ICPADS.2000.857738},
  doi          = {10.1109/ICPADS.2000.857738},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpads/YiS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Warchus99c,
  author       = {John Warchus},
  title        = {Protecting software and confidential information},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {15},
  number       = {5},
  pages        = {331--332},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0267-3649(99)80075-2},
  doi          = {10.1016/S0267-3649(99)80075-2},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Warchus99c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jamia/BuckovichRR99,
  author       = {Suzy A. Buckovich and
                  Helga E. Rippen and
                  Michael J. Rozen},
  title        = {Viewpoint: Driving Toward Guiding Principles: {A} Goal for Privacy,
                  Confidentiality, and Security of Health Information},
  journal      = {J. Am. Medical Informatics Assoc.},
  volume       = {6},
  number       = {2},
  pages        = {122--133},
  year         = {1999},
  url          = {https://doi.org/10.1136/jamia.1999.0060122},
  doi          = {10.1136/JAMIA.1999.0060122},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jamia/BuckovichRR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cbms/Ting99,
  author       = {T. C. Ting},
  title        = {Privacy and Confidentiality in Healthcare Delivery Information System},
  booktitle    = {12th {IEEE} Symposium on Computer-Based Medical Systems {(CBMS} '99).
                  18-20 June 1999, Stamford, CT, {USA}},
  pages        = {2},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CBMS.1999.781239},
  doi          = {10.1109/CBMS.1999.781239},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cbms/Ting99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmi/MoehrM98,
  author       = {Jochen R. Moehr and
                  James G. McDaniel},
  title        = {Adoption of security and confidentiality features in an operational
                  community health information network: the Comox Valley experience
                  - case example},
  journal      = {Int. J. Medical Informatics},
  volume       = {49},
  number       = {1},
  pages        = {81--87},
  year         = {1998},
  url          = {https://doi.org/10.1016/S1386-5056(98)00014-8},
  doi          = {10.1016/S1386-5056(98)00014-8},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijmi/MoehrM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informs/GopalGG98,
  author       = {Ram D. Gopal and
                  Paulo B. G{\'{o}}es and
                  Robert S. Garfinkel},
  title        = {Interval Protection of Confidential Information in a Database},
  journal      = {{INFORMS} J. Comput.},
  volume       = {10},
  number       = {3},
  pages        = {309--322},
  year         = {1998},
  url          = {https://doi.org/10.1287/ijoc.10.3.309},
  doi          = {10.1287/IJOC.10.3.309},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/informs/GopalGG98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/FabreP97,
  author       = {Jean{-}Charles Fabre and
                  Tanguy P{\'{e}}rennou},
  title        = {Processing of confidential information in distributed systems by fragmentation},
  journal      = {Comput. Commun.},
  volume       = {20},
  number       = {3},
  pages        = {177--188},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0140-3664(97)00005-4},
  doi          = {10.1016/S0140-3664(97)00005-4},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/FabreP97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HimdiS97,
  author       = {T. F. Himdi and
                  Ravi S. Sandhu},
  title        = {Lattice Based Models for Controlled Sharing of Confidential Information
                  in the Saudi Hajj System},
  booktitle    = {13th Annual Computer Security Applications Conference {(ACSAC} 1997),
                  8-12 December 1997, San Diego, CA, {USA}},
  pages        = {164--174},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/CSAC.1997.646186},
  doi          = {10.1109/CSAC.1997.646186},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HimdiS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amia/BowenKRB97,
  author       = {J. W. Bowen and
                  J. C. Klimczak and
                  M. Ruiz and
                  M. Barnes},
  title        = {Design of access control methods for protecting the confidentiality
                  of patient information in networked systems},
  booktitle    = {{AMIA} 1997, American Medical Informatics Association Annual Symposium,
                  Nashville, TN, USA, October 25-29, 1997},
  publisher    = {{AMIA}},
  year         = {1997},
  url          = {https://knowledge.amia.org/amia-55142-a1997a-1.585351/t-001-1.587519/f-001-1.587520/a-009-1.587989/a-010-1.587986},
  timestamp    = {Wed, 17 Apr 2024 11:48:58 +0200},
  biburl       = {https://dblp.org/rec/conf/amia/BowenKRB97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/97/Landrock097,
  author       = {Peter Landrock and
                  John Williams},
  editor       = {Ross Anderson},
  title        = {Security and Confidentiality Issues Relating to the Electronic Data
                  Interchange of Clinical Data},
  booktitle    = {Personal Medical Information - Security, Engineering, and Ethics},
  pages        = {165--173},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/978-3-642-59023-8\_13},
  doi          = {10.1007/978-3-642-59023-8\_13},
  timestamp    = {Fri, 15 May 2020 12:41:35 +0200},
  biburl       = {https://dblp.org/rec/books/sp/97/Landrock097.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/97/Rigby97,
  author       = {Michael Rigby},
  editor       = {Ross Anderson},
  title        = {Keeping Confidence in Confidentiality: Linking Ethics, Efficacy, and
                  Opportunity in Health Care Computing - {A} Case Study},
  booktitle    = {Personal Medical Information - Security, Engineering, and Ethics},
  pages        = {129--150},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/978-3-642-59023-8\_11},
  doi          = {10.1007/978-3-642-59023-8\_11},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/97/Rigby97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/97/RobertsTR097,
  author       = {Ruth Roberts and
                  Joyce K. Thomas and
                  Michael Rigby and
                  John Williams},
  editor       = {Ross Anderson},
  title        = {Practical Protection of Confidentiality in Acute Health Care},
  booktitle    = {Personal Medical Information - Security, Engineering, and Ethics},
  pages        = {67--78},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/978-3-642-59023-8\_6},
  doi          = {10.1007/978-3-642-59023-8\_6},
  timestamp    = {Fri, 22 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/97/RobertsTR097.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Jackson96,
  author       = {Ian W. Jackson},
  editor       = {Ross J. Anderson},
  title        = {Anonymous Addresses and Confidentiality of Location},
  booktitle    = {Information Hiding, First International Workshop, Cambridge, UK, May
                  30 - June 1, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1174},
  pages        = {115--120},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-61996-8\_35},
  doi          = {10.1007/3-540-61996-8\_35},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Jackson96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93dd,
  title        = {Securing confidential information for competitive advantage},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {6},
  pages        = {281--285},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90040-T},
  doi          = {10.1016/0267-3649(93)90040-T},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93dd.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Parker93c,
  author       = {Donn B. Parker},
  title        = {Confidentiality of Information and Personal Privacy},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {2},
  number       = {1},
  pages        = {13--17},
  year         = {1993},
  url          = {https://doi.org/10.1080/19393559308551337},
  doi          = {10.1080/19393559308551337},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Parker93c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Biskup89,
  author       = {Joachim Biskup},
  editor       = {David L. Spooner and
                  Carl E. Landwehr},
  title        = {Protection of Privacy and Confidentiality in Medical Information Systems:
                  Problems and Guidelines},
  booktitle    = {Database Security, {III:} Status and Prospects. Results of the {IFIP}
                  {WG} 11.3 Workshop on Database Security, Monterey, California, USA,
                  September 5-7, 1989},
  pages        = {13--23},
  publisher    = {North-Holland},
  year         = {1989},
  timestamp    = {Wed, 16 Jul 2014 19:05:09 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/Biskup89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Lewis88,
  author       = {David P. Lewis},
  title        = {Protecting your confidential information},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {4},
  pages        = {28--31},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90150-1},
  doi          = {10.1016/0267-3649(88)90150-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Lewis88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tods/PalleyS87,
  author       = {Michael A. Palley and
                  Jeffrey S. Simonoff},
  title        = {The Use of Regression Methodology for the Compromise of Confidential
                  Information in Statistical Databases},
  journal      = {{ACM} Trans. Database Syst.},
  volume       = {12},
  number       = {4},
  pages        = {593--608},
  year         = {1987},
  url          = {https://doi.org/10.1145/32204.42174},
  doi          = {10.1145/32204.42174},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tods/PalleyS87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/Fletcher86,
  author       = {Patricia T. Fletcher},
  title        = {Current issues in confidentiality: Computerized information systems,
                  medical records, and patient rights},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {16},
  number       = {2-3},
  pages        = {8--18},
  year         = {1986},
  url          = {https://doi.org/10.1145/15483.15485},
  doi          = {10.1145/15483.15485},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcas/Fletcher86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iam/Roos81,
  author       = {H. Roos},
  title        = {Confidentiality of information},
  journal      = {Inf. Manag.},
  volume       = {4},
  number       = {1},
  pages        = {17--21},
  year         = {1981},
  url          = {https://doi.org/10.1016/0378-7206(81)90021-5},
  doi          = {10.1016/0378-7206(81)90021-5},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iam/Roos81.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/afips/Comber69,
  author       = {Edward V. Comber},
  title        = {Management of confidential information},
  booktitle    = {American Federation of Information Processing Societies: Proceedings
                  of the {AFIPS} '69 Fall Joint Computer Conference, November 18-20,
                  1969, Las Vegas, Navada, {USA}},
  series       = {{AFIPS} Conference Proceedings},
  volume       = {35},
  pages        = {135--143},
  publisher    = {{AFIPS} / {ACM}},
  year         = {1969},
  url          = {https://doi.org/10.1145/1478559.1478575},
  doi          = {10.1145/1478559.1478575},
  timestamp    = {Wed, 14 Apr 2021 16:50:07 +0200},
  biburl       = {https://dblp.org/rec/conf/afips/Comber69.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics