Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "confidential information"
@article{DBLP:journals/ijmi/AfrazMSAJ24, author = {Ali Afraz and Mahdieh Montazeri and Mahin Eslami Shahrbabaki and Leila Ahmadian and Yunes Jahani}, title = {The viewpoints of parents of children with mental disorders regarding the confidentiality and security of their children's information in the Iranian national electronic health record system}, journal = {Int. J. Medical Informatics}, volume = {183}, pages = {105334}, year = {2024}, url = {https://doi.org/10.1016/j.ijmedinf.2023.105334}, doi = {10.1016/J.IJMEDINF.2023.105334}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmi/AfrazMSAJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/AlSumaidaeeZ24, author = {Ghassan Al{-}Sumaidaee and Zeljko Zilic}, title = {Sensing Data Concealment in NFTs: {A} Steganographic Model for Confidential Cross-Border Information Exchange}, journal = {Sensors}, volume = {24}, number = {4}, pages = {1264}, year = {2024}, url = {https://doi.org/10.3390/s24041264}, doi = {10.3390/S24041264}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/AlSumaidaeeZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/VermaC24, author = {Praveen Verma and Chandan Chakraborty}, title = {High Impact Local Load Redistribution Attack Without Confidential Network Information}, journal = {{IEEE} Trans. Smart Grid}, volume = {15}, number = {2}, pages = {2383--2386}, year = {2024}, url = {https://doi.org/10.1109/TSG.2023.3343125}, doi = {10.1109/TSG.2023.3343125}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsg/VermaC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Bannour23, author = {Nesrine Bannour}, title = {Information Extraction from Electronic Health Records: Studies on temporal ordering, privacy and environmental impact. (Extraction d'Informations {\`{a}} partir des Dossiers Patients Informatis{\'{e}}s: Etudes en temporalit{\'{e}}, confidentialit{\'{e}} et impact environnemental)}, school = {University of Paris-Saclay, France}, year = {2023}, url = {https://tel.archives-ouvertes.fr/tel-04347666}, timestamp = {Thu, 04 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/hal/Bannour23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aci/BedgoodRBGCSPPM23, author = {Michael Bedgood and Naveed Rabbani and Conner Brown and Rachel Goldstein and Jennifer L. Carlson and Ethan Steinberg and Austin Powell and Natalie M. Pageler and Keith E. Morse}, title = {The Prevalence of Confidential Content in Adolescent Progress Notes Prior to the 21st Century Cures Act Information Blocking Mandate}, journal = {Appl. Clin. Inform.}, volume = {14}, number = {2}, pages = {337--344}, year = {2023}, url = {https://doi.org/10.1055/s-0043-1767682}, doi = {10.1055/S-0043-1767682}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aci/BedgoodRBGCSPPM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/AnwarulKBAH23, author = {Shahina Anwarul and Sunil Kumar and Ashok Bhansali and Hammam A. Alshazly and Hany S. Hussein}, title = {Hybrid Dynamic Optimization for Multilevel Security System in Disseminating Confidential Information}, journal = {Comput. Syst. Sci. Eng.}, volume = {47}, number = {3}, pages = {3145--3163}, year = {2023}, url = {https://doi.org/10.32604/csse.2023.041061}, doi = {10.32604/CSSE.2023.041061}, timestamp = {Mon, 04 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csse/AnwarulKBAH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/WuXSZZ23, author = {Bingxue Wu and Sai Xu and Yu Shao and Jiliang Zhang and Jie Zhang}, title = {{IRS} Backscatter Based Hybrid Confidential Information and {AN} for Secrecy Transmission}, journal = {{IEEE} Commun. Lett.}, volume = {27}, number = {2}, pages = {462--466}, year = {2023}, url = {https://doi.org/10.1109/LCOMM.2022.3225244}, doi = {10.1109/LCOMM.2022.3225244}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/icl/WuXSZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmi/AlipourMKKA23, author = {Jahanpour Alipour and Yousef Mehdipour and Afsaneh Karimi and Mohadeseh Khorashadizadeh and Maryam Akbarpour}, title = {Security, confidentiality, privacy and patient safety in the hospital information systems from the users' perspective: {A} cross-sectional study}, journal = {Int. J. Medical Informatics}, volume = {175}, pages = {105066}, year = {2023}, url = {https://doi.org/10.1016/j.ijmedinf.2023.105066}, doi = {10.1016/J.IJMEDINF.2023.105066}, timestamp = {Sun, 04 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmi/AlipourMKKA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/MarimuthuMKV23, author = {M. Marimuthu and G. Mohanraj and D. Karthikeyan and D. Vidyabharathi}, title = {Safeguard confidential web information from malicious browser extension using Encryption and Isolation techniques}, journal = {J. Intell. Fuzzy Syst.}, volume = {45}, number = {4}, pages = {6145--6160}, year = {2023}, url = {https://doi.org/10.3233/jifs-233122}, doi = {10.3233/JIFS-233122}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jifs/MarimuthuMKV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/KhanKHJ23, author = {Lal Said Khan and Majid Khan and Mohammad Mazyad Hazzazi and Sajjad Shaukat Jamal}, title = {A novel combination of information confidentiality and data hiding mechanism}, journal = {Multim. Tools Appl.}, volume = {82}, number = {5}, pages = {6917--6941}, year = {2023}, url = {https://doi.org/10.1007/s11042-022-13623-3}, doi = {10.1007/S11042-022-13623-3}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/KhanKHJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/HlaingA23, author = {Htet Htet Hlaing and Hitoshi Asaeda}, title = {Ensuring Content Integrity and Confidentiality in Information-Centric Secure Networks}, booktitle = {20th {IEEE} Consumer Communications {\&} Networking Conference, {CCNC} 2023, Las Vegas, NV, USA, January 8-11, 2023}, pages = {810--816}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CCNC51644.2023.10060672}, doi = {10.1109/CCNC51644.2023.10060672}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccnc/HlaingA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsc2/MousayMB23, author = {Fatimah Dawoud Mousay and Souad I. Mugassabi and Asma Ail Budalal}, title = {Security Measures for Ensuring Confidentiality of Information Using Encryption by Elliptic Curve with Precomputation}, booktitle = {11th {IEEE} International Conference on Systems and Control, {ICSC} 2023, Sousse, Tunisia, December 18-20, 2023}, pages = {938--942}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICSC58660.2023.10449816}, doi = {10.1109/ICSC58660.2023.10449816}, timestamp = {Wed, 13 Mar 2024 19:10:52 +0100}, biburl = {https://dblp.org/rec/conf/icsc2/MousayMB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/jcsse/VhitoC23, author = {Kudakwashe Vhito and Varin Chouvatut}, title = {Steganography with Adaptable Separate Encrypted Code of Hidden Confidential Information}, booktitle = {20th {IEEE} International Joint Conference on Computer Science and Software Engineering, {JCSSE} 2023, Phitsanulok, Thailand, June 28 - July 1, 2023}, pages = {523--528}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/JCSSE58229.2023.10202145}, doi = {10.1109/JCSSE58229.2023.10202145}, timestamp = {Tue, 22 Aug 2023 08:08:17 +0200}, biburl = {https://dblp.org/rec/conf/jcsse/VhitoC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-00016, author = {Robinson Onyemechi Oturugbum}, title = {Preserving The Safety And Confidentiality Of Data Mining Information In Health Care: {A} literature review}, journal = {CoRR}, volume = {abs/2312.00016}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.00016}, doi = {10.48550/ARXIV.2312.00016}, eprinttype = {arXiv}, eprint = {2312.00016}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-00016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/RizwanSJSGSH22, author = {Muhammad Rizwan and Aysha Shabbir and Abdul Rehman Javed and Gautam Srivastava and Thippa Reddy Gadekallu and Maryam Shabir and Muhammad Abul Hassan}, title = {Risk monitoring strategy for confidentiality of healthcare information}, journal = {Comput. Electr. Eng.}, volume = {100}, pages = {107833}, year = {2022}, url = {https://doi.org/10.1016/j.compeleceng.2022.107833}, doi = {10.1016/J.COMPELECENG.2022.107833}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/RizwanSJSGSH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/digitalsociety/Schneider22, author = {Diana Schneider}, title = {Ensuring Privacy and Confidentiality in Social Work Through Intentional Omissions of Information in Client Information Systems: a Qualitative Study of Available and Non-available Data}, journal = {Digit. Soc.}, volume = {1}, number = {3}, year = {2022}, url = {https://doi.org/10.1007/s44206-022-00029-9}, doi = {10.1007/S44206-022-00029-9}, timestamp = {Thu, 13 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/digitalsociety/Schneider22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/LinLCW22, author = {Pei{-}Yu Lin and Wen{-}Shao Lan and Yi{-}Hui Chen and Wen{-}Chuan Wu}, title = {A Confidential {QR} Code Approach with Higher Information Privacy}, journal = {Entropy}, volume = {24}, number = {2}, pages = {284}, year = {2022}, url = {https://doi.org/10.3390/e24020284}, doi = {10.3390/E24020284}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entropy/LinLCW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/TakanaK22, author = {Norimasa Takana and Hiroki Kashiwazaki}, editor = {Hong Va Leong and Sahra Sedigh Sarvestani and Yuuichi Teranishi and Alfredo Cuzzocrea and Hiroki Kashiwazaki and Dave Towey and Ji{-}Jiang Yang and Hossain Shahriar}, title = {Design and evaluation of a dedicated information environment with both portability and confidentiality}, booktitle = {46th {IEEE} Annual Computers, Software, and Applications Conferenc, {COMPSAC} 2022, Los Alamitos, CA, USA, June 27 - July 1, 2022}, pages = {1038--1043}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/COMPSAC54236.2022.00162}, doi = {10.1109/COMPSAC54236.2022.00162}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/compsac/TakanaK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/ChadwickGDD22, author = {Samuel Chadwick and Scott R. Graham and James Dean and Matthew Dallmeyer}, editor = {Jason Staggs and Sujeet Shenoi}, title = {Leveraging Confidential Computing to Enable Secure Information Sharing}, booktitle = {Critical Infrastructure Protection {XVI} - 16th {IFIP} {WG} 11.10 International Conference, {ICCIP} 2022, Virtual Event, March 14-15, 2022, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {666}, pages = {235--252}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-20137-0\_9}, doi = {10.1007/978-3-031-20137-0\_9}, timestamp = {Thu, 08 Dec 2022 17:43:50 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-10/ChadwickGDD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Fernandes21, author = {Natasha Fernandes}, title = {Differential Privacy for Metric Spaces: Information-Theoretic Models for Privacy and Utility with New Applications to Metric Domains. (Confidentialit{\'{e}} diff{\'{e}}rentielle pour les espaces m{\'{e}}triques: mod{\`{e}}les th{\'{e}}oriques de l'information pour la confidentialit{\'{e}} et l'utilit{\'{e}} avec de nouvelles applications aux domaines m{\'{e}}triques)}, school = {{\'{E}}cole Polytechnique, Palaiseau, France}, year = {2021}, url = {https://tel.archives-ouvertes.fr/tel-03344453}, timestamp = {Thu, 06 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/hal/Fernandes21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ar/OyamaYNTAOO21, author = {Eimei Oyama and Motoki Yodowatari and Sousuke Nakamura and Kohei Tokoi and Arvin Agah and Hiroyuki Okada and Takashi Omori}, title = {Integrating {AR/MR/DR} technology in remote seal to maintain confidentiality of information}, journal = {Adv. Robotics}, volume = {35}, number = {11}, pages = {704--714}, year = {2021}, url = {https://doi.org/10.1080/01691864.2021.1929472}, doi = {10.1080/01691864.2021.1929472}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ar/OyamaYNTAOO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mansci/ColemanMMP21, author = {Braiden Coleman and Kenneth J. Merkley and Brian Miller and Joseph Pacelli}, title = {Does the Freedom of Information Act Foil the Securities and Exchange Commission's Intent to Keep Investigations Confidential?}, journal = {Manag. Sci.}, volume = {67}, number = {6}, pages = {3419--3428}, year = {2021}, url = {https://doi.org/10.1287/mnsc.2020.3625}, doi = {10.1287/MNSC.2020.3625}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mansci/ColemanMMP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/ZhangLL21, author = {Xiaheng Zhang and Jiazhong Lu and Doudou Li}, title = {Confidential information protection method of commercial information physical system based on edge computing}, journal = {Neural Comput. Appl.}, volume = {33}, number = {3}, pages = {897--907}, year = {2021}, url = {https://doi.org/10.1007/s00521-020-05272-0}, doi = {10.1007/S00521-020-05272-0}, timestamp = {Fri, 19 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nca/ZhangLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/patterns/DydaPCFPRWMHWL21, author = {Amalie Dyda and Michael Purcell and Stephanie Jane Curtis and Emma Field and Priyanka Pillai and Kieran Ricardo and Haotian Weng and Jessica C. Moore and Michael Hewett and Graham Williams and Colleen L. Lau}, title = {Differential privacy for public health data: An innovative tool to optimize information sharing while protecting data confidentiality}, journal = {Patterns}, volume = {2}, number = {12}, pages = {100366}, year = {2021}, url = {https://doi.org/10.1016/j.patter.2021.100366}, doi = {10.1016/J.PATTER.2021.100366}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/patterns/DydaPCFPRWMHWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/KaurD21, author = {Joti Kaur and Simran Dhillon}, editor = {Yolande E. Chan and Maric Boudreau and Benoit Aubert and Guy Par{\'{e}} and Wynne Chin}, title = {Privacy calculus and intension to share confidential information}, booktitle = {27th Americas Conference on Information Systems, {AMCIS} 2021, Virtual Conference, August 9-13, 2021}, publisher = {Association for Information Systems}, year = {2021}, url = {https://aisel.aisnet.org/amcis2021/info\_security/info\_security/11}, timestamp = {Mon, 30 Aug 2021 12:04:20 +0200}, biburl = {https://dblp.org/rec/conf/amcis/KaurD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/BabenkoSA21, author = {Liudmila Babenko and Alexander Shumilin and Dmitry Alekseev}, editor = {Naghmeh Moradpoor and Atilla El{\c{c}}i and Andrei Petrovski}, title = {Development of the algorithm to ensure the protection of confidential data in cloud medical information system}, booktitle = {14th International Conference on Security of Information and Networks, {SIN} 2021, Edinburgh, United Kingdom, December 15-17, 2021}, pages = {1--4}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SIN54109.2021.9699356}, doi = {10.1109/SIN54109.2021.9699356}, timestamp = {Wed, 23 Feb 2022 18:55:51 +0100}, biburl = {https://dblp.org/rec/conf/sin/BabenkoSA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/CaruccioDPT20, author = {Loredana Caruccio and Domenico Desiato and Giuseppe Polese and Genoveffa Tortora}, title = {{GDPR} Compliant Information Confidentiality Preservation in Big Data Processing}, journal = {{IEEE} Access}, volume = {8}, pages = {205034--205050}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3036916}, doi = {10.1109/ACCESS.2020.3036916}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/CaruccioDPT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/KhanJW20, author = {Majid Khan and Sajjad Shaukat Jamal and Umer Aziz Waqas}, title = {A novel combination of information hiding and confidentiality scheme}, journal = {Multim. Tools Appl.}, volume = {79}, number = {41-42}, pages = {30983--31005}, year = {2020}, url = {https://doi.org/10.1007/s11042-020-09610-1}, doi = {10.1007/S11042-020-09610-1}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/KhanJW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/EgoshinKS20, author = {Nikolay Sergeevich Egoshin and Anton Konev and Alexander Alexandrovich Shelupanov}, title = {A Model of Threats to the Confidentiality of Information Processed in Cyberspace Based on the Information Flows Model}, journal = {Symmetry}, volume = {12}, number = {11}, pages = {1840}, year = {2020}, url = {https://doi.org/10.3390/sym12111840}, doi = {10.3390/SYM12111840}, timestamp = {Fri, 24 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/symmetry/EgoshinKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/LiuWLWGN20, author = {Zhixin Liu and Sainan Wang and Yang Liu and Yu Wang and Xinping Guan and Dusit Niyato}, title = {Robust Secure Transmission and Power Transfer in Heterogeneous Networks With Confidential Information}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {69}, number = {10}, pages = {11192--11205}, year = {2020}, url = {https://doi.org/10.1109/TVT.2020.3008349}, doi = {10.1109/TVT.2020.3008349}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvt/LiuWLWGN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csonet/MamtaGCP20, author = {Mamta and Brij Bhooshan Gupta and Kwok Tai Chui and Konstantinos E. Psannis}, editor = {Sriram Chellappan and Kim{-}Kwang Raymond Choo and NhatHai Phan}, title = {Metadata Security Measures for Protecting Confidential Information on the Cloud}, booktitle = {Computational Data and Social Networks - 9th International Conference, CSoNet 2020, Dallas, TX, USA, December 11-13, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12575}, pages = {398--410}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-66046-8\_33}, doi = {10.1007/978-3-030-66046-8\_33}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csonet/MamtaGCP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecai/JiangLYJG0H20, author = {Jianguo Jiang and Yue Lu and Min Yu and Yantao Jia and Jiafeng Guo and Chao Liu and Weiqing Huang}, editor = {Giuseppe De Giacomo and Alejandro Catal{\'{a}} and Bistra Dilkina and Michela Milano and Sen{\'{e}}n Barro and Alberto Bugar{\'{\i}}n and J{\'{e}}r{\^{o}}me Lang}, title = {CIDetector: Semi-Supervised Method for Multi-Topic Confidential Information Detection}, booktitle = {{ECAI} 2020 - 24th European Conference on Artificial Intelligence, 29 August-8 September 2020, Santiago de Compostela, Spain, August 29 - September 8, 2020 - Including 10th Conference on Prestigious Applications of Artificial Intelligence {(PAIS} 2020)}, series = {Frontiers in Artificial Intelligence and Applications}, volume = {325}, pages = {1834--1841}, publisher = {{IOS} Press}, year = {2020}, url = {https://doi.org/10.3233/FAIA200299}, doi = {10.3233/FAIA200299}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecai/JiangLYJG0H20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/haisa/ShojaifarF20, author = {Alireza Shojaifar and Samuel A. Fricker}, editor = {Nathan L. Clarke and Steven Furnell}, title = {SMEs' Confidentiality Concerns for Security Information Sharing}, booktitle = {Human Aspects of Information Security and Assurance - 14th {IFIP} {WG} 11.12 International Symposium, {HAISA} 2020, Mytilene, Lesbos, Greece, July 8-10, 2020, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {593}, pages = {289--299}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57404-8\_22}, doi = {10.1007/978-3-030-57404-8\_22}, timestamp = {Tue, 25 Aug 2020 19:09:10 +0200}, biburl = {https://dblp.org/rec/conf/haisa/ShojaifarF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icinco/IurevaTPK20, author = {Radda A. Iureva and Sergey V. Taranov and Alexander V. Penskoi and Artem S. Kremlev}, editor = {Oleg Gusikhin and Kurosh Madani and Janan Zaytoon}, title = {Ensuring Confidentiality of Information When Processing Operational Production Plans in Cloud Services}, booktitle = {Proceedings of the 17th International Conference on Informatics in Control, Automation and Robotics, {ICINCO} 2020, Lieusaint, Paris, France, July 7-9, 2020}, pages = {167--173}, publisher = {ScitePress}, year = {2020}, url = {https://doi.org/10.5220/0009873201670173}, doi = {10.5220/0009873201670173}, timestamp = {Tue, 06 Jun 2023 14:58:01 +0200}, biburl = {https://dblp.org/rec/conf/icinco/IurevaTPK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/JiangLY0LAH20, author = {Jianguo Jiang and Yue Lu and Min Yu and Gang Li and Chao Liu and Shaohua An and Weiqing Huang}, title = {CES2Vec: {A} Confidentiality-Oriented Word Embedding for Confidential Information Detection}, booktitle = {{IEEE} Symposium on Computers and Communications, {ISCC} 2020, Rennes, France, July 7-10, 2020}, pages = {1--7}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ISCC50000.2020.9219702}, doi = {10.1109/ISCC50000.2020.9219702}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscc/JiangLY0LAH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ksem/LuJYLLHL20, author = {Yue Lu and Jianguo Jiang and Min Yu and Chao Liu and Chaochao Liu and Weiqing Huang and Zhiqiang Lv}, editor = {Gang Li and Heng Tao Shen and Ye Yuan and Xiaoyang Wang and Huawen Liu and Xiang Zhao}, title = {Depthwise Separable Convolutional Neural Network for Confidential Information Analysis}, booktitle = {Knowledge Science, Engineering and Management - 13th International Conference, {KSEM} 2020, Hangzhou, China, August 28-30, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12275}, pages = {450--461}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55393-7\_40}, doi = {10.1007/978-3-030-55393-7\_40}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ksem/LuJYLLHL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-06308, author = {Alireza Shojaifar and Samuel A. Fricker}, title = {SMEs Confidentiality Concerns for Security Information Sharing}, journal = {CoRR}, volume = {abs/2007.06308}, year = {2020}, url = {https://arxiv.org/abs/2007.06308}, eprinttype = {arXiv}, eprint = {2007.06308}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-06308.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/BuIK19, author = {Lake Bu and Mihailo Isakov and Michel A. Kinsy}, title = {A secure and robust scheme for sharing confidential information in IoT systems}, journal = {Ad Hoc Networks}, volume = {92}, year = {2019}, url = {https://doi.org/10.1016/j.adhoc.2018.09.007}, doi = {10.1016/J.ADHOC.2018.09.007}, timestamp = {Fri, 05 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/BuIK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-cdt/BuIK19, author = {Lake Bu and Mihailo Isakov and Michel A. Kinsy}, title = {{RASSS:} a hijack-resistant confidential information management scheme for distributed systems}, journal = {{IET} Comput. Digit. Tech.}, volume = {13}, number = {3}, pages = {206--217}, year = {2019}, url = {https://doi.org/10.1049/iet-cdt.2018.5167}, doi = {10.1049/IET-CDT.2018.5167}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-cdt/BuIK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmhci/HaqueSRA19, author = {S. M. Taiabul Haque and Pratyasha Saha and Muhammad Sajidur Rahman and Syed Ishtiaque Ahmed}, title = {Of Ulti, 'hajano', and "Matachetar otanetak datam": Exploring Local Practices of Exchanging Confidential and Sensitive Information in Urban Bangladesh}, journal = {Proc. {ACM} Hum. Comput. Interact.}, volume = {3}, number = {{CSCW}}, pages = {173:1--173:22}, year = {2019}, url = {https://doi.org/10.1145/3359275}, doi = {10.1145/3359275}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pacmhci/HaqueSRA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShabbirSRA19, author = {Aysha Shabbir and Maryam Shabbir and Muhammad Rizwan and Fahad Ahmad}, title = {Ensuring the Confidentiality of Nuclear Information at Cloud Using Modular Encryption Standard}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {2509898:1--2509898:16}, year = {2019}, url = {https://doi.org/10.1155/2019/2509898}, doi = {10.1155/2019/2509898}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ShabbirSRA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigir/OlteanuGRERLBOL19, author = {Alexandra Olteanu and Jean Garcia{-}Gathright and Maarten de Rijke and Michael D. Ekstrand and Adam Roegiest and Aldo Lipani and Alex Beutel and Ana Lucic and Ana{-}Andreea Stoica and Anubrata Das and Asia Biega and Bart Voorn and Claudia Hauff and Damiano Spina and David D. Lewis and Douglas W. Oard and Emine Yilmaz and Faegheh Hasibi and Gabriella Kazai and Graham McDonald and Hinda Haned and Iadh Ounis and Ilse van der Linden and Joris Baan and Kamuela N. Lau and Krisztian Balog and Mahmoud F. Sayed and Maria Panteli and Mark Sanderson and Matthew Lease and Preethi Lahoti and Toshihiro Kamishima}, title = {{FACTS-IR:} fairness, accountability, confidentiality, transparency, and safety in information retrieval}, journal = {{SIGIR} Forum}, volume = {53}, number = {2}, pages = {20--43}, year = {2019}, url = {https://doi.org/10.1145/3458553.3458556}, doi = {10.1145/3458553.3458556}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigir/OlteanuGRERLBOL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ant/SilvaCVRSF19, author = {Jes{\'{u}}s Silva and Jenny Cubillos and Jes{\'{u}}s Vargas Villa and Ligia Romero and Darwin Solano and Claudia Fern{\'{a}}ndez}, editor = {Elhadi M. Shakshuki and Ansar{-}Ul{-}Haque Yasar}, title = {Preservation of confidential information privacy and association rule hiding for data mining: a bibliometric review}, booktitle = {The 10th International Conference on Ambient Systems, Networks and Technologies {(ANT} 2019) / The 2nd International Conference on Emerging Data and Industry 4.0 {(EDI40} 2019) / Affiliated Workshops, April 29 - May 2, 2019, Leuven, Belgium}, series = {Procedia Computer Science}, volume = {151}, pages = {1219--1224}, publisher = {Elsevier}, year = {2019}, url = {https://doi.org/10.1016/j.procs.2019.04.175}, doi = {10.1016/J.PROCS.2019.04.175}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ant/SilvaCVRSF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ehealth2/SheikhtaheriHH19, author = {Abbas Sheikhtaheri and Nasim Hashemi and Niyoosha{-}sadat Hashemi}, editor = {Dieter Hayn and Alphons Eggerth and G{\"{u}}nter Schreier}, title = {Performance of Hospitals in Protecting the Confidentiality and Information Security of Patients in Health Information Departments}, booktitle = {dHealth 2019 - From eHealth to dHealth - Proceedings of the 13th Health Informatics Meets Digital Health Conference, dHealth 2019, Vienna, Austria, 28-29 May, 2019}, series = {Studies in Health Technology and Informatics}, volume = {260}, pages = {202--209}, publisher = {{IOS} Press}, year = {2019}, url = {https://doi.org/10.3233/978-1-61499-971-3-202}, doi = {10.3233/978-1-61499-971-3-202}, timestamp = {Mon, 14 Mar 2022 17:10:13 +0100}, biburl = {https://dblp.org/rec/conf/ehealth2/SheikhtaheriHH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/BaronH19, author = {Lior Baron and Tzipora Halevi}, editor = {Constantine Stephanidis}, title = {Feasibility Assessment of Cloud SaaS Enabled Collaboration and Information Confidentiality for the Public Accounting Industry}, booktitle = {{HCI} International 2019 - Late Breaking Papers - 21st {HCI} International Conference, {HCII} 2019, Orlando, FL, USA, July 26-31, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11786}, pages = {451--467}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30033-3\_35}, doi = {10.1007/978-3-030-30033-3\_35}, timestamp = {Thu, 05 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hci/BaronH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/medes/LivragaV19, author = {Giovanni Livraga and Marco Viviani}, editor = {Richard Chbeir and Yannis Manolopoulos and Sergio Ilarri and Apostolos Papadopoulos}, title = {Data Confidentiality and Information Credibility in On-line Ecosystems}, booktitle = {11th International Conference on Management of Digital EcoSystems, {MEDES} 2019, Limassol, Cyprus, November, 2019}, pages = {191--198}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3297662.3365829}, doi = {10.1145/3297662.3365829}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/medes/LivragaV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigir/OlteanuGRE19, author = {Alexandra Olteanu and Jean Garcia{-}Gathright and Maarten de Rijke and Michael D. Ekstrand}, editor = {Benjamin Piwowarski and Max Chevalier and {\'{E}}ric Gaussier and Yoelle Maarek and Jian{-}Yun Nie and Falk Scholer}, title = {Workshop on Fairness, Accountability, Confidentiality, Transparency, and Safety in Information Retrieval {(FACTS-IR)}}, booktitle = {Proceedings of the 42nd International {ACM} {SIGIR} Conference on Research and Development in Information Retrieval, {SIGIR} 2019, Paris, France, July 21-25, 2019}, pages = {1423--1425}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3331184.3331644}, doi = {10.1145/3331184.3331644}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigir/OlteanuGRE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-11934, author = {Lake Bu and Mihailo Isakov and Michel A. Kinsy}, title = {A Secure and Robust Scheme for Sharing Confidential Information in IoT Systems}, journal = {CoRR}, volume = {abs/1911.11934}, year = {2019}, url = {http://arxiv.org/abs/1911.11934}, eprinttype = {arXiv}, eprint = {1911.11934}, timestamp = {Tue, 03 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-11934.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/El-Rahman18, author = {Sahar A. El{-}Rahman}, title = {A comparative analysis of image steganography based on {DCT} algorithm and steganography tool to hide nuclear reactors confidential information}, journal = {Comput. Electr. Eng.}, volume = {70}, pages = {380--399}, year = {2018}, url = {https://doi.org/10.1016/j.compeleceng.2016.09.001}, doi = {10.1016/J.COMPELECENG.2016.09.001}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/El-Rahman18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/WaqasAZL18, author = {Muhammad Waqas and Manzoor Ahmed and Jiayi Zhang and Yong Li}, title = {Confidential Information Ensurance through Physical Layer Security in Device-to-Device Communication}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2018, Abu Dhabi, United Arab Emirates, December 9-13, 2018}, pages = {1--7}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/GLOCOM.2018.8647343}, doi = {10.1109/GLOCOM.2018.8647343}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/WaqasAZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ethos/Hussein17, author = {Jamal Ali Hussein}, title = {{PROV-GTS:} a template-based {PROV} graph transformation system for obscuring provenance confidential information}, school = {University of Southampton, {UK}}, year = {2017}, url = {https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.736711}, timestamp = {Tue, 05 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ethos/Hussein17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/VorakulpipatSRS17, author = {Chalee Vorakulpipat and Soontorn Sirapaisan and Ekkachan Rattanalerdnusorn and Visut Savangsuk}, title = {A Policy-Based Framework for Preserving Confidentiality in {BYOD} Environments: {A} Review of Information Security Perspectives}, journal = {Secur. Commun. Networks}, volume = {2017}, pages = {2057260:1--2057260:11}, year = {2017}, url = {https://doi.org/10.1155/2017/2057260}, doi = {10.1155/2017/2057260}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/VorakulpipatSRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/ZhangTL17, author = {Zhiyu Zhang and Kah Chan Teh and Kwok Hung Li}, title = {Distributed Optimization for Resilient Transmission of Confidential Information in Interference Channels}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {66}, number = {1}, pages = {494--501}, year = {2017}, url = {https://doi.org/10.1109/TVT.2016.2536744}, doi = {10.1109/TVT.2016.2536744}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/ZhangTL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/Lin17, author = {Yan{-}Xia Lin}, title = {Mining the Statistical Information of Confidential Data from Noise-Multiplied Data}, booktitle = {15th {IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress, DASC/PiCom/DataCom/CyberSciTech 2017, Orlando, FL, USA, November 6-10, 2017}, pages = {1292--1297}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2017.208}, doi = {10.1109/DASC-PICOM-DATACOM-CYBERSCITEC.2017.208}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dasc/Lin17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/meco/GromovBG17, author = {Aleksey Y. Gromov and Aleksey I. Baranchikov and Natalya N. Grinchenko}, title = {Simulation of business processes in the information systems containing confidential information}, booktitle = {6th Mediterranean Conference on Embedded Computing, {MECO} 2017, Bar, Montenegro, June 11-15, 2017}, pages = {1--4}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/MECO.2017.7977156}, doi = {10.1109/MECO.2017.7977156}, timestamp = {Mon, 09 Aug 2021 14:54:01 +0200}, biburl = {https://dblp.org/rec/conf/meco/GromovBG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/medinfo/SaidRGJ17, author = {Mohamed Ben Sa{\"{\i}}d and Laurence Robel and Bernard Golse and Jean Philippe Ja{\"{\i}}s}, editor = {Adi V. Gundlapalli and Marie{-}Christine Jaulent and Dongsheng Zhao}, title = {Strengthening Data Confidentiality and Integrity Protection in the Context of a Multi-Centric Information System Dedicated to Autism Spectrum Disorder}, booktitle = {{MEDINFO} 2017: Precision Healthcare through Informatics - Proceedings of the 16th World Congress on Medical and Health Informatics, Hangzhou, China, 21-25 August 2017}, series = {Studies in Health Technology and Informatics}, volume = {245}, pages = {1133--1137}, publisher = {{IOS} Press}, year = {2017}, url = {https://doi.org/10.3233/978-1-61499-830-3-1133}, doi = {10.3233/978-1-61499-830-3-1133}, timestamp = {Wed, 03 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/medinfo/SaidRGJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mipro/VojkovicM17, author = {Goran Vojkovic and Melita Milenkovic}, editor = {Petar Biljanovic and Marko Koricic and Karolj Skala and Tihana Galinac Grbac and Marina Cicin{-}Sain and Vlado Sruk and Slobodan Ribaric and Stjepan Gros and Boris Vrdoljak and Mladen Mauher and Edvard Tijan and Filip Hormot}, title = {Legal framework issues managing confidential business information in the Republic of Croatia}, booktitle = {40th International Convention on Information and Communication Technology, Electronics and Microelectronics, {MIPRO} 2017, Opatija, Croatia, May 22-26, 2017}, pages = {1319--1323}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/MIPRO.2017.7973627}, doi = {10.23919/MIPRO.2017.7973627}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/mipro/VojkovicM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BiskupTZ17, author = {Joachim Biskup and Cornelia Tadros and Jaouad Zarouali}, title = {Confidentiality enforcement by hybrid control of information flows}, journal = {CoRR}, volume = {abs/1707.08482}, year = {2017}, url = {http://arxiv.org/abs/1707.08482}, eprinttype = {arXiv}, eprint = {1707.08482}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BiskupTZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/WangZY16, author = {Hui Wang and Weiming Zhang and Nenghai Yu}, title = {Protecting patient confidential information based on {ECG} reversible data hiding}, journal = {Multim. Tools Appl.}, volume = {75}, number = {21}, pages = {13733--13747}, year = {2016}, url = {https://doi.org/10.1007/s11042-015-2706-2}, doi = {10.1007/S11042-015-2706-2}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/WangZY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/GuptaC16, author = {Nirupam Gupta and Nikhil Chopra}, title = {Confidentiality in distributed average information consensus}, booktitle = {55th {IEEE} Conference on Decision and Control, {CDC} 2016, Las Vegas, NV, USA, December 12-14, 2016}, pages = {6709--6714}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CDC.2016.7799302}, doi = {10.1109/CDC.2016.7799302}, timestamp = {Fri, 04 Mar 2022 13:29:43 +0100}, biburl = {https://dblp.org/rec/conf/cdc/GuptaC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/is/AbuadbbaK15, author = {Alsharif Abuadbba and Ibrahim Khalil}, title = {Wavelet based steganographic technique to protect household confidential information and seal the transmitted smart grid readings}, journal = {Inf. Syst.}, volume = {53}, pages = {224--236}, year = {2015}, url = {https://doi.org/10.1016/j.is.2014.09.004}, doi = {10.1016/J.IS.2014.09.004}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/is/AbuadbbaK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/JaskolkaKS15, author = {Jason Jaskolka and Ridha Kh{\'{e}}dri and Khair Eddin Sabri}, title = {Investigative support for information confidentiality}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {6}, number = {4}, pages = {425--451}, year = {2015}, url = {https://doi.org/10.1007/s12652-015-0289-4}, doi = {10.1007/S12652-015-0289-4}, timestamp = {Mon, 10 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jaihc/JaskolkaKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisis-spain/Martin-Fernandez15, author = {Francisco Mart{\'{\i}}n{-}Fern{\'{a}}ndez and Pino Caballero{-}Gil and C{\'{a}}ndido Caballero{-}Gil}, editor = {{\'{A}}lvaro Herrero and Bruno Baruque and Javier Sedano and H{\'{e}}ctor Quinti{\'{a}}n and Emilio Corchado}, title = {Non-Interactive Authentication and Confidential Information Exchange for Mobile Environments}, booktitle = {International Joint Conference - CISIS'15 and ICEUTE'15, 8th International Conference on Computational Intelligence in Security for Information Systems / 6th International Conference on EUropean Transnational Education, Burgos, Spain, 15-17 June, 2015}, series = {Advances in Intelligent Systems and Computing}, volume = {369}, pages = {261--271}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19713-5\_23}, doi = {10.1007/978-3-319-19713-5\_23}, timestamp = {Fri, 12 Aug 2022 13:44:54 +0200}, biburl = {https://dblp.org/rec/conf/cisis-spain/Martin-Fernandez15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/ZhangLHY15, author = {Haiyang Zhang and Chunguo Li and Yongming Huang and Luxi Yang}, title = {Simultaneous Wireless Information and Power Transfer in a {MISO} Broadcast Channel with Confidential Messages}, booktitle = {2015 {IEEE} Global Communications Conference, {GLOBECOM} 2015, San Diego, CA, USA, December 6-10, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/GLOCOM.2014.7417829}, doi = {10.1109/GLOCOM.2014.7417829}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/ZhangLHY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifiptm/HusseinMS15, author = {Jamal Ali Hussein and Luc Moreau and Vladimiro Sassone}, editor = {Christian Damsgaard Jensen and Stephen Marsh and Theo Dimitrakos and Yuko Murayama}, title = {Obscuring Provenance Confidential Information via Graph Transformation}, booktitle = {Trust Management {IX} - 9th {IFIP} {WG} 11.11 International Conference, {IFIPTM} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {454}, pages = {109--125}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18491-3\_8}, doi = {10.1007/978-3-319-18491-3\_8}, timestamp = {Sun, 02 Oct 2022 16:07:38 +0200}, biburl = {https://dblp.org/rec/conf/ifiptm/HusseinMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/medinfo/LiuaLCLC15, author = {Hsiu{-}Chu Liua and Hsing Li and Hsin{-}Fei Chang and Mei{-}Rou Lu and Feng{-}Chuan Chen}, editor = {Indra Neil Sarkar and Andrew Georgiou and Paulo Mazzoncini de Azevedo Marques}, title = {Application of Barcoding to Reduce Error of Patient Identification and to Increase Patient's Information Confidentiality of Test Tube Labelling in a Psychiatric Teaching Hospital}, booktitle = {{MEDINFO} 2015: eHealth-enabled Health - Proceedings of the 15th World Congress on Health and Biomedical Informatics, S{\~{a}}o Paulo, Brazil, 19-23 August 2015}, series = {Studies in Health Technology and Informatics}, volume = {216}, pages = {919}, publisher = {{IOS} Press}, year = {2015}, url = {https://doi.org/10.3233/978-1-61499-564-7-919}, doi = {10.3233/978-1-61499-564-7-919}, timestamp = {Wed, 03 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/medinfo/LiuaLCLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/sci/ChertovT15, author = {Oleg Chertov and Dan Tavrov}, editor = {Ronald R. Yager and Marek Z. Reformat and Naif Alajlan}, title = {Microfiles as a Potential Source of Confidential Information Leakage}, booktitle = {Intelligent Methods for Cyber Warfare}, series = {Studies in Computational Intelligence}, volume = {563}, pages = {87--114}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-08624-8\_4}, doi = {10.1007/978-3-319-08624-8\_4}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/sci/ChertovT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Bordenabe14, author = {Nicol{\'{a}}s E. Bordenabe}, title = {Mesurer la confidentialit{\'{e}} avec des m{\'{e}}triques de discernabilit{\'{e}}: d{\'{e}}finitions, m{\'{e}}canismes et confidentialit{\'{e}} des informations li{\'{e}}es {\`{a}} la localisation. (Measuring Privacy with Distinguishability Metrics: Definitions, Mechanisms and Application to Location Privacy)}, school = {{\'{E}}cole Polytechnique, Palaiseau, France}, year = {2014}, url = {https://tel.archives-ouvertes.fr/tel-01098088}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hal/Bordenabe14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/hij/HunterEW14, author = {Inga M. Hunter and Gael Haining Ede and Richard J. Whiddett}, title = {Increased electronic information sharing by sexual health services: Confidentiality and consent}, journal = {Health Informatics J.}, volume = {20}, number = {1}, pages = {3--12}, year = {2014}, url = {https://doi.org/10.1177/1460458212475140}, doi = {10.1177/1460458212475140}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/hij/HunterEW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/embc/Al-DmourAN14, author = {Hayat Al{-}Dmour and Ahmed Al{-}Ani and Hung T. Nguyen}, title = {An efficient steganography method for hiding patient confidential information}, booktitle = {36th Annual International Conference of the {IEEE} Engineering in Medicine and Biology Society, {EMBC} 2014, Chicago, IL, USA, August 26-30, 2014}, pages = {222--225}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/EMBC.2014.6943569}, doi = {10.1109/EMBC.2014.6943569}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/embc/Al-DmourAN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fnc/JaskolkaKS14, author = {Jason Jaskolka and Ridha Kh{\'{e}}dri and Khair Eddin Sabri}, title = {Investigative Support for Information Confidentiality Part {II:} Applications in Cryptanalysis and Digital Forensics}, booktitle = {The 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, August 17-20, 2014, Niagara Falls, Canada}, series = {Procedia Computer Science}, volume = {34}, pages = {266--275}, publisher = {Elsevier}, year = {2014}, url = {https://doi.org/10.1016/j.procs.2014.07.022}, doi = {10.1016/J.PROCS.2014.07.022}, timestamp = {Thu, 08 Jul 2021 16:04:01 +0200}, biburl = {https://dblp.org/rec/conf/fnc/JaskolkaKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fnc/JaskolkaKS14a, author = {Jason Jaskolka and Ridha Kh{\'{e}}dri and Khair Eddin Sabri}, title = {Investigative Support for Information Confidentiality Part {I:} Detecting Confidential Information Leakage via Protocol-based Covert Channels}, booktitle = {The 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, August 17-20, 2014, Niagara Falls, Canada}, series = {Procedia Computer Science}, volume = {34}, pages = {276--285}, publisher = {Elsevier}, year = {2014}, url = {https://doi.org/10.1016/j.procs.2014.07.023}, doi = {10.1016/J.PROCS.2014.07.023}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fnc/JaskolkaKS14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/DaiM14, author = {Bin Dai and Zheng Ma}, title = {Feedback enhances the security of degraded broadcast channels with confidential messages and causal channel state information}, booktitle = {2014 {IEEE} Information Theory Workshop, {ITW} 2014, Hobart, Tasmania, Australia, November 2-5, 2014}, pages = {411--415}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ITW.2014.6970864}, doi = {10.1109/ITW.2014.6970864}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itw/DaiM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tbe/IbaidaK13, author = {Ayman Ibaida and Ibrahim Khalil}, title = {Wavelet-Based {ECG} Steganography for Protecting Patient Confidential Information in Point-of-Care Systems}, journal = {{IEEE} Trans. Biomed. Eng.}, volume = {60}, number = {12}, pages = {3322--3330}, year = {2013}, url = {https://doi.org/10.1109/TBME.2013.2264539}, doi = {10.1109/TBME.2013.2264539}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tbe/IbaidaK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/GamageRMC13, author = {Thoshitha T. Gamage and Thomas P. Roth and Bruce M. McMillin and Mariesa L. Crow}, title = {Mitigating Event Confidentiality Violations in Smart Grids: An Information Flow Security-Based Approach}, journal = {{IEEE} Trans. Smart Grid}, volume = {4}, number = {3}, pages = {1227--1234}, year = {2013}, url = {https://doi.org/10.1109/TSG.2013.2243924}, doi = {10.1109/TSG.2013.2243924}, timestamp = {Fri, 09 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsg/GamageRMC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/SergeevMB13, author = {Ivan Sergeev and Muriel M{\'{e}}dard and Jo{\~{a}}o Barros}, editor = {Joe Senftle and Mike Beltrani and Kari Karwedsky}, title = {Melting Pad: An Efficiently Decodable Coding Scheme for Information Theoretic Confidentiality}, booktitle = {32th {IEEE} Military Communications Conference, {MILCOM} 2013, San Diego, CA, USA, November 18-20, 2013}, pages = {458--463}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/MILCOM.2013.85}, doi = {10.1109/MILCOM.2013.85}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/milcom/SergeevMB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spawc/SchaeferPB13, author = {Rafael F. Schaefer and H. Vincent Poor and Holger Boche}, title = {{MIMO} Gaussian broadcast channels with private and confidential messages and with receiver side information}, booktitle = {14th {IEEE} Workshop on Signal Processing Advances in Wireless Communications, {SPAWC} 2013, Darmstadt, Germany, June 16-19, 2013}, pages = {659--663}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/SPAWC.2013.6612132}, doi = {10.1109/SPAWC.2013.6612132}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/spawc/SchaeferPB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YooPK12, author = {Sang Guun Yoo and Keunyoung Park and Juho Kim}, title = {Confidential information protection system for mobile devices}, journal = {Secur. Commun. Networks}, volume = {5}, number = {12}, pages = {1452--1461}, year = {2012}, url = {https://doi.org/10.1002/sec.516}, doi = {10.1002/SEC.516}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YooPK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/IshiiRU12, author = {Junya Ishii and Afiza Razali and Ryuya Uda}, editor = {Leonard Barolli and Tomoya Enokido and Fatos Xhafa and Makoto Takizawa}, title = {Confidential Information Poisoning Methods by Considering the Information Length in Electronic Portable Devices}, booktitle = {26th International Conference on Advanced Information Networking and Applications Workshops, {WAINA} 2012, Fukuoka, Japan, March 26-29, 2012}, pages = {78--84}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/WAINA.2012.177}, doi = {10.1109/WAINA.2012.177}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/IshiiRU12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apsec/NishikawaOM12, author = {Kiyoshi Nishikawa and Kenji Oki and Akihiko Matsuo}, editor = {Karl R. P. H. Leung and Pornsiri Muenchaisri}, title = {SaaS Application Framework Using Information Gateway Enabling Cloud Service with Data Confidentiality}, booktitle = {19th Asia-Pacific Software Engineering Conference, {APSEC} 2012, Hong Kong, China, December 4-7, 2012}, pages = {334--337}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/APSEC.2012.133}, doi = {10.1109/APSEC.2012.133}, timestamp = {Sun, 08 Aug 2021 01:40:48 +0200}, biburl = {https://dblp.org/rec/conf/apsec/NishikawaOM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/CohenA12, author = {Jason C. Cohen and Subrata Acharya}, title = {Incorporating hardware trust mechanisms in Apache Hadoop: To improve the integrity and confidentiality of data in a distributed Apache Hadoop file system: An information technology infrastructure and software approach}, booktitle = {Workshops Proceedings of the Global Communications Conference, {GLOBECOM} 2012, 3-7 December 2012, Anaheim, California, {USA}}, pages = {769--774}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/GLOCOMW.2012.6477672}, doi = {10.1109/GLOCOMW.2012.6477672}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/CohenA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/DaiHVLZ12, author = {Bin Dai and Jiehua Hong and A. J. Han Vinck and Yuan Luo and Zhuojun Zhuang}, title = {Degraded broadcast channel with noncausal side information, confidential messages and noiseless feedback}, booktitle = {Proceedings of the 2012 {IEEE} International Symposium on Information Theory, {ISIT} 2012, Cambridge, MA, USA, July 1-6, 2012}, pages = {438--442}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISIT.2012.6284226}, doi = {10.1109/ISIT.2012.6284226}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/DaiHVLZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/RamaFB12, author = {Sobhana Rama and Stephen Flowerday and Duane Boucher}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Information confidentiality and the Chinese Wall Model in Government tender fraud}, booktitle = {2012 Information Security for South Africa, Balalaika Hotel, Sandton, Johannesburg, South Africa, August 15-17, 2012}, pages = {1--8}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISSA.2012.6320438}, doi = {10.1109/ISSA.2012.6320438}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/issa/RamaFB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/0001B12, author = {Johannes Braun and Johannes Buchmann}, editor = {Albert Levi and Mohamad Badra and Matteo Cesana and Mona Ghassemian and {\"{O}}zg{\"{u}}r G{\"{u}}rb{\"{u}}z and Nafa{\^{a}} Jabeur and Marek Klonowski and Antonio Ma{\~{n}}a and Susana Sargento and Sherali Zeadally}, title = {Perfect Confidentiality Network: {A} Solution for Information Theoretically Secure Key Agreement}, booktitle = {5th International Conference on New Technologies, Mobility and Security, Istanbul, Turkey, {NTMS} 2012, May 7-10, 2012}, pages = {1--5}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/NTMS.2012.6208676}, doi = {10.1109/NTMS.2012.6208676}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ntms/0001B12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/worldcis/FernandoZ12, author = {Des Fernando and Pavol Zavarsky}, title = {Secure decommissioning of confidential electronically stored information {(CESI):} {A} framework for managing {CESI} in the disposal phaseas needed}, booktitle = {2012 World Congress on Internet Security, WorldCIS 2012, Guelph, ON, Canada, June 10-12, 2012}, pages = {218--222}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6280181/}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/worldcis/FernandoZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1201-2859, author = {Bin Dai}, title = {Degraded Broadcast Channel with Side Information, Confidential Messages and Noiseless Feedback}, journal = {CoRR}, volume = {abs/1201.2859}, year = {2012}, url = {http://arxiv.org/abs/1201.2859}, eprinttype = {arXiv}, eprint = {1201.2859}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1201-2859.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1206-4123, author = {Mingqiang Li}, title = {On the Confidentiality of Information Dispersal Algorithms and Their Erasure Codes}, journal = {CoRR}, volume = {abs/1206.4123}, year = {2012}, url = {http://arxiv.org/abs/1206.4123}, eprinttype = {arXiv}, eprint = {1206.4123}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1206-4123.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/allerton/HayashiM11, author = {Masahito Hayashi and Ryutaroh Matsumoto}, title = {Universally attainable error and information exponents, and equivocation rate for the broadcast channels with confidential messages}, booktitle = {49th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2011, Allerton Park {\&} Retreat Center, Monticello, IL, USA, 28-30 September, 2011}, pages = {439--444}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/Allerton.2011.6120200}, doi = {10.1109/ALLERTON.2011.6120200}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/allerton/HayashiM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/KerschbaumSK11, author = {Florian Kerschbaum and Jens Str{\"{u}}ker and Thomas G. Koslowski}, editor = {Dennis F. Galletta and Ting{-}Peng Liang}, title = {Confidential Information-Sharing for Automated Sustainability Benchmarks}, booktitle = {Proceedings of the International Conference on Information Systems, {ICIS} 2011, Shanghai, China, December 4-7, 2011}, publisher = {Association for Information Systems}, year = {2011}, url = {http://aisel.aisnet.org/icis2011/proceedings/breakthroughideas/4}, timestamp = {Sun, 25 Oct 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icis/KerschbaumSK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/tf/Sherizen11, author = {Sanford Sherizen}, editor = {Rebecca Herold}, title = {Management Compliance: Confidential Information}, booktitle = {Encyclopedia of Information Assurance}, publisher = {Taylor {\&} Francis}, year = {2011}, url = {https://doi.org/10.1081/E-EIA-120046585}, doi = {10.1081/E-EIA-120046585}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/tf/Sherizen11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1101-0345, author = {Yuya Dan}, title = {Diffusion of Confidential Information on Networks}, journal = {CoRR}, volume = {abs/1101.0345}, year = {2011}, url = {http://arxiv.org/abs/1101.0345}, eprinttype = {arXiv}, eprint = {1101.0345}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1101-0345.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1103-3332, author = {Raju Singh and A. K. Vatsa}, title = {Confidentiality {\&} Authentication Mechanism for Biometric Information Transmitted over Low Bandwidth {\&} Unreliable channel}, journal = {CoRR}, volume = {abs/1103.3332}, year = {2011}, url = {http://arxiv.org/abs/1103.3332}, eprinttype = {arXiv}, eprint = {1103.3332}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1103-3332.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1104-4285, author = {Masahito Hayashi and Ryutaroh Matsumoto}, title = {Universally Attainable Error and Information Exponents for the Broadcast Channels with Confidential Messages}, journal = {CoRR}, volume = {abs/1104.4285}, year = {2011}, url = {http://arxiv.org/abs/1104.4285}, eprinttype = {arXiv}, eprint = {1104.4285}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1104-4285.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/CristofaroK10, author = {Emiliano De Cristofaro and Jihye Kim}, title = {Some Like It Private: Sharing Confidential Information Based on Oblivious Authorization}, journal = {{IEEE} Secur. Priv.}, volume = {8}, number = {4}, pages = {18--24}, year = {2010}, url = {https://doi.org/10.1109/MSP.2010.91}, doi = {10.1109/MSP.2010.91}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/CristofaroK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Slavkovic10, author = {Aleksandra B. Slavkovic}, title = {Partial Information Releases for Confidential Contingency Table Entries: Present and Future Research Efforts}, journal = {J. Priv. Confidentiality}, volume = {1}, number = {2}, year = {2010}, url = {https://doi.org/10.29012/jpc.v1i2.577}, doi = {10.29012/JPC.V1I2.577}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Slavkovic10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/WaldoLC10, author = {James Waldo and Herbert S. Lin and Lawrence H. Cox}, title = {Thinking About Privacy: Chapter 1 of "Engaging Privacy and Information Technology in a Digital Age"}, journal = {J. Priv. Confidentiality}, volume = {2}, number = {1}, year = {2010}, url = {https://doi.org/10.29012/jpc.v2i1.581}, doi = {10.29012/JPC.V2I1.581}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/WaldoLC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/WaldoLM10, author = {James Waldo and Herbert S. Lin and Lynette I. Millett}, title = {Engaging Privacy and Information Technology in a Digital Age: Executive Summary}, journal = {J. Priv. Confidentiality}, volume = {2}, number = {1}, year = {2010}, url = {https://doi.org/10.29012/jpc.v2i1.580}, doi = {10.29012/JPC.V2I1.580}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/WaldoLM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/NabiNTHAA10, author = {Syed Irfan Nabi and Syed Waqar Nabi and Syed Awais Ahmed Tipu and Bushra Haqqi and Zahra Abid and Khaled Alghathbar}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {Data Confidentiality and Integrity Issues and Role of Information Security Management Standard, Policies and Practices - An Empirical Study of Telecommunication Industry in Pakistan}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {47--56}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_6}, doi = {10.1007/978-3-642-17610-4\_6}, timestamp = {Sat, 30 Sep 2023 09:41:06 +0200}, biburl = {https://dblp.org/rec/conf/fgit/NabiNTHAA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/AccorsiW10, author = {Rafael Accorsi and Claus Wonnemann}, editor = {Jorge Cu{\'{e}}llar and Gilles Barthe and Alexander Pretschner}, title = {InDico: Information Flow Analysis of Business Processes for Confidentiality Requirements}, booktitle = {Security and Trust Management - 6th International Workshop, {STM} 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6710}, pages = {194--209}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22444-7\_13}, doi = {10.1007/978-3-642-22444-7\_13}, timestamp = {Sat, 19 Oct 2019 20:20:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/AccorsiW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wowmom/Barbeau10, author = {Michel Barbeau}, title = {Assessment of the true risks to the protection of confidential information in the wireless home and office environment}, booktitle = {11th {IEEE} International Symposium on a World of Wireless, Mobile and Multimedia Networks, {WOWMOM} 2010, Montreal, QC, Canada, 14-17 June, 2010}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/WOWMOM.2010.5534940}, doi = {10.1109/WOWMOM.2010.5534940}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wowmom/Barbeau10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Borders09, author = {Kevin Borders}, title = {Protecting Confidential Information from Malicious Software}, school = {University of Michigan, {USA}}, year = {2009}, url = {https://hdl.handle.net/2027.42/63795}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Borders09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/de/Fischmann2008, author = {Matthias Fischmann}, title = {Data confidentiality and reputation schemes in distributed information systems}, school = {Humboldt University of Berlin, Unter den Linden, Germany}, year = {2008}, url = {http://edoc.hu-berlin.de/dissertationen/fischmann-matthias-2008-05-23/PDF/fischmann.pdf}, urn = {urn:nbn:de:kobv:11-10092394}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/de/Fischmann2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csjm/Papanaga08, author = {Victor Papanaga}, title = {Confidentiality and Security in Medical Information Systems}, journal = {Comput. Sci. J. Moldova}, volume = {16}, number = {3}, pages = {442--453}, year = {2008}, url = {http://www.math.md/publications/csjm/issues/v16-n3/9974/}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csjm/Papanaga08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mansci/LiZ08, author = {Lode Li and Hongtao Zhang}, title = {Confidentiality and Information Sharing in Supply Chain Coordination}, journal = {Manag. Sci.}, volume = {54}, number = {8}, pages = {1467--1481}, year = {2008}, url = {https://doi.org/10.1287/mnsc.1070.0851}, doi = {10.1287/MNSC.1070.0851}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mansci/LiZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/BaekKSL08, author = {Eunju Baek and Yeog Kim and Jinwon Sung and Sangjin Lee}, editor = {Matthew Sorell and Lang White}, title = {The design of framework for detecting an insider's leak of confidential information}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {14}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/e-forensics.2008.2658}, doi = {10.4108/E-FORENSICS.2008.2658}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/BaekKSL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ZhangSCJMY08, author = {Hui Zhang and Abhishek B. Sharma and Haifeng Chen and Guofei Jiang and Xiaoqiao Meng and Kenji Yoshihira}, title = {Enabling Information Confidentiality in Publish/Subscribe Overlay Services}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2008, Beijing, China, 19-23 May 2008}, pages = {5624--5628}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ICC.2008.1054}, doi = {10.1109/ICC.2008.1054}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/ZhangSCJMY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipaw/NagappanV08, author = {Meiyappan Nagappan and Mladen A. Vouk}, editor = {Juliana Freire and David Koop and Luc Moreau}, title = {A Model for Sharing of Confidential Provenance Information in a Query Based System}, booktitle = {Provenance and Annotation of Data and Processes, Second International Provenance and Annotation Workshop, {IPAW} 2008, Salt Lake City, UT, USA, June 17-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5272}, pages = {62--69}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89965-5\_8}, doi = {10.1007/978-3-540-89965-5\_8}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ipaw/NagappanV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WangLLC08, author = {XiaoFeng Wang and Zhuowei Li and Ninghui Li and Jong Youl Choi}, title = {{PRECIP:} Towards Practical and Retrofittable Confidential Information Protection}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2008, San Diego, California, USA, 10th February - 13th February 2008}, publisher = {The Internet Society}, year = {2008}, url = {https://www.ndss-symposium.org/ndss2008/precip-towards-practical-and-retrofittable-confidential-information-protection/}, timestamp = {Wed, 02 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/WangLLC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securware/GoudaloS08, author = {Wilson Goudalo and Dominique Seret}, editor = {Andr{\'{e}} Cotton and Oana Dini and Antonio Fernandez G{\'{o}}mez{-}Skarmeta and Mihaela Ion and Manuela Popescu and Masaru Takesue}, title = {Toward the Engineering of Security of Information Systems {(ESIS):} {UML} and the {IS} Confidentiality}, booktitle = {Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies, {SECURWARE} 2008, August 25-31, 2008, Cap Esterel, France}, pages = {248--256}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SECURWARE.2008.66}, doi = {10.1109/SECURWARE.2008.66}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securware/GoudaloS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/LeGuernic07, author = {Gurvan Le Guernic}, title = {Confidentiality Enforcement Using Dynamic Information Flow Analyses}, school = {Kansas State University, United States of America}, year = {2007}, url = {https://tel.archives-ouvertes.fr/tel-00198621}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hal/LeGuernic07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/geb/DaughetyR07, author = {Andrew F. Daughety and Jennifer F. Reinganum}, title = {Competition and confidentiality: Signaling quality in a duopoly when there is universal private information}, journal = {Games Econ. Behav.}, volume = {58}, number = {1}, pages = {94--120}, year = {2007}, url = {https://doi.org/10.1016/j.geb.2006.03.001}, doi = {10.1016/J.GEB.2006.03.001}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/geb/DaughetyR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijhisi/LendingD07, author = {Diane Lending and Thomas W. Dillon}, title = {The Effects of Confidentiality on Nursing Self-Efficacy with Information Systems}, journal = {Int. J. Heal. Inf. Syst. Informatics}, volume = {2}, number = {3}, pages = {49--64}, year = {2007}, url = {https://doi.org/10.4018/jhisi.2007070105}, doi = {10.4018/JHISI.2007070105}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijhisi/LendingD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ior/NunezGG07, author = {Manuel A. Nunez and Robert S. Garfinkel and Ram D. Gopal}, title = {Stochastic Protection of Confidential Information in Databases: {A} Hybrid of Data Perturbation and Query Restriction}, journal = {Oper. Res.}, volume = {55}, number = {5}, pages = {890--908}, year = {2007}, url = {https://doi.org/10.1287/opre.1070.0407}, doi = {10.1287/OPRE.1070.0407}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ior/NunezGG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/SloaneLS07, author = {Elliot Sloane and Gondy Leroy and Steven D. Sheetz}, editor = {John A. Hoxmeier and Stephen C. Hayne}, title = {An Integrated Social Actor and Service Oriented Architecture {(SOA)} Approach for Improved Electronic Health Record {(EHR)} Privacy and Confidentiality in the {US} National Healthcare Information Network {(NHIN)}}, booktitle = {Reaching New Heights. 13th Americas Conference on Information Systems, {AMCIS} 2007, Keystone, Colorado, USA, August 9-12, 2007}, pages = {366}, publisher = {Association for Information Systems}, year = {2007}, url = {http://aisel.aisnet.org/amcis2007/366}, timestamp = {Thu, 26 Nov 2020 16:35:40 +0100}, biburl = {https://dblp.org/rec/conf/amcis/SloaneLS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wecwis/IkawaK07, author = {Yohei Ikawa and Hiroshi Kanayama}, title = {A New Document Masking Approach for Removing Confidential Information}, booktitle = {9th {IEEE} International Conference on E-Commerce Technology {(CEC} 2007) / 4th {IEEE} International Conference on Enterprise Computing, E-Commerce and E-Services {(EEE} 2007), 23-26 July 2007, National Center of Sciences, Tokyo, Japan}, pages = {107--114}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/CEC-EEE.2007.8}, doi = {10.1109/CEC-EEE.2007.8}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wecwis/IkawaK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/sci/LongpreK07, author = {Luc Longpr{\'{e}} and Vladik Kreinovich}, editor = {Nadia Nedjah and Ajith Abraham and Luiza de Macedo Mourelle}, title = {How to Efficiently Process Uncertainty within a Cyberinfrastructure without Sacrificing Privacy and Confidentiality}, booktitle = {Computational Intelligence in Information Assurance and Security}, series = {Studies in Computational Intelligence}, volume = {57}, pages = {155--173}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71078-3\_6}, doi = {10.1007/978-3-540-71078-3\_6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/sci/LongpreK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnis/WangA06, author = {Bei Wang and Jim Alves{-}Foss}, editor = {Sanguthevar Rajasekaran}, title = {An {MSLS-EMM} for enforcing confidentiality in malicious environments}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {126--131}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Fri, 26 Jan 2007 13:40:33 +0100}, biburl = {https://dblp.org/rec/conf/cnis/WangA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecai/OrenNP06, author = {Nir Oren and Timothy J. Norman and Alun D. Preece}, editor = {Gerhard Brewka and Silvia Coradeschi and Anna Perini and Paolo Traverso}, title = {Arguing with Confidential Information}, booktitle = {{ECAI} 2006, 17th European Conference on Artificial Intelligence, August 29 - September 1, 2006, Riva del Garda, Italy, Including Prestigious Applications of Intelligent Systems {(PAIS} 2006), Proceedings}, series = {Frontiers in Artificial Intelligence and Applications}, volume = {141}, pages = {280--284}, publisher = {{IOS} Press}, year = {2006}, url = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=1691}, timestamp = {Tue, 13 Mar 2012 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecai/OrenNP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/datamine/FienbergS05, author = {Stephen E. Fienberg and Aleksandra B. Slavkovic}, title = {Preserving the Confidentiality of Categorical Statistical Data Bases When Releasing Information for Association Rules}, journal = {Data Min. Knowl. Discov.}, volume = {11}, number = {2}, pages = {155--180}, year = {2005}, url = {https://doi.org/10.1007/s10618-005-0010-x}, doi = {10.1007/S10618-005-0010-X}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/datamine/FienbergS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/datamine/Mateo-SanzDS05, author = {Josep Maria Mateo{-}Sanz and Josep Domingo{-}Ferrer and Francesc Seb{\'{e}}}, title = {Probabilistic Information Loss Measures in Confidentiality Protection of Continuous Microdata}, journal = {Data Min. Knowl. Discov.}, volume = {11}, number = {2}, pages = {181--193}, year = {2005}, url = {https://doi.org/10.1007/s10618-005-0011-9}, doi = {10.1007/S10618-005-0011-9}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/datamine/Mateo-SanzDS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/NaliAM05, author = {Deholo Nali and Carlisle M. Adams and Ali Miri}, editor = {Jianying Zhou and Javier L{\'{o}}pez and Robert H. Deng and Feng Bao}, title = {Time-Based Release of Confidential Information in Hierarchical Settings}, booktitle = {Information Security, 8th International Conference, {ISC} 2005, Singapore, September 20-23, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3650}, pages = {29--43}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11556992\_3}, doi = {10.1007/11556992\_3}, timestamp = {Thu, 29 Aug 2019 08:10:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/NaliAM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BiskupB04, author = {Joachim Biskup and Piero A. Bonatti}, title = {Controlled query evaluation for enforcing confidentiality in complete information systems}, journal = {Int. J. Inf. Sec.}, volume = {3}, number = {1}, pages = {14--27}, year = {2004}, url = {https://doi.org/10.1007/s10207-004-0032-1}, doi = {10.1007/S10207-004-0032-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BiskupB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/HuiCPYTCC04, author = {Lucas Chi Kwong Hui and Kam{-}Pui Chow and Kevin K. H. Pun and Siu{-}Ming Yiu and Wai Wan Tsang and C. F. Chong and H. W. Chan}, title = {Risk Management of Corporate Confidential Information in Digital Form}, booktitle = {28th International Computer Software and Applications Conference {(COMPSAC} 2004), Design and Assessment of Trustworthy Software-Based Systems, 27-30 September 2004, Hong Kong, China, Proceedings}, pages = {88--89}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/CMPSAC.2004.1342810}, doi = {10.1109/CMPSAC.2004.1342810}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/HuiCPYTCC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/TrutaFC03, author = {Traian Marius Truta and Farshad Fotouhi and Daniel C. Barth{-}Jones}, editor = {Sushil Jajodia and Pierangela Samarati and Paul F. Syverson}, title = {Privacy and confidentiality management for the microaggregation disclosure control method: disclosure risk and information loss measures}, booktitle = {Proceedings of the 2003 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2003, Washington, DC, USA, October 30, 2003}, pages = {21--30}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/1005140.1005144}, doi = {10.1145/1005140.1005144}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/TrutaFC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/MontHS03, author = {Marco Casassa Mont and Keith Harrison and Martin Sadler}, editor = {Guszt{\'{a}}v Hencsey and Bebo White and Yih{-}Farn Robin Chen and L{\'{a}}szl{\'{o}} Kov{\'{a}}cs and Steve Lawrence}, title = {The {HP} time vault service: exploiting {IBE} for timed release of confidential information}, booktitle = {Proceedings of the Twelfth International World Wide Web Conference, {WWW} 2003, Budapest, Hungary, May 20-24, 2003}, pages = {160--169}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/775152.775175}, doi = {10.1145/775152.775175}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/MontHS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ClaytonD02, author = {Richard Clayton and George Danezis}, editor = {Fabien A. P. Petitcolas}, title = {Chaffinch: Confidentiality in the Face of Legal Threats}, booktitle = {Information Hiding, 5th International Workshop, {IH} 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2578}, pages = {70--86}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36415-3\_5}, doi = {10.1007/3-540-36415-3\_5}, timestamp = {Sun, 02 Oct 2022 16:07:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/ClaytonD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ads/KarrLSHKL02, author = {Alan F. Karr and Jaeyong Lee and Ashish P. Sanil and Joel Hernandez and Sousan Karimi and Karen Litwin}, editor = {William J. McIver Jr. and Ahmed K. Elmagarmid}, title = {Web-Based Systems that Disseminate Information from Databases but Protect Confidentiality}, booktitle = {Advances in Digital Government - Technology, Human Factors, and Policy}, series = {Advances in Database Systems}, volume = {26}, pages = {181--196}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/0-306-47374-7\_11}, doi = {10.1007/0-306-47374-7\_11}, timestamp = {Tue, 16 May 2017 14:24:24 +0200}, biburl = {https://dblp.org/rec/series/ads/KarrLSHKL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic/ChadwickNMM01, author = {David W. Chadwick and John P. New and D. M. McDowall and Darren P. Mundy}, editor = {Peter Graham and Muthucumaru Maheswaran and M. Rasit Eskicioglu}, title = {Providing Secure Access to Confidential Patient Information Detailing Diabetic Condition}, booktitle = {Proceedings of the International Conference on Internet Computing, {IC} 2001, Las Vegas, Nevada, USA, June 25-28, 2001}, pages = {535--542}, publisher = {{CSREA} Press}, year = {2001}, timestamp = {Thu, 09 Feb 2017 09:59:20 +0100}, biburl = {https://dblp.org/rec/conf/ic/ChadwickNMM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmi/PatelAS00, author = {Vimla L. Patel and Jos{\'{e}} F. Arocha and Edward H. Shortliffe}, title = {Cognitive models in training health professionals to protect patients' confidential information}, journal = {Int. J. Medical Informatics}, volume = {60}, number = {2}, pages = {143--150}, year = {2000}, url = {https://doi.org/10.1016/S1386-5056(00)00114-3}, doi = {10.1016/S1386-5056(00)00114-3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmi/PatelAS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/YiS00, author = {Xun Yi and Chee Kheong Siew}, title = {Software Agent-Mediated Confidential Information Gathering System}, booktitle = {Seventh International Conference on Parallel and Distributed Systems, {ICPADS} 2000, Iwate, Japan, July 4-7, 2000}, pages = {523--528}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ICPADS.2000.857738}, doi = {10.1109/ICPADS.2000.857738}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpads/YiS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Warchus99c, author = {John Warchus}, title = {Protecting software and confidential information}, journal = {Comput. Law Secur. Rev.}, volume = {15}, number = {5}, pages = {331--332}, year = {1999}, url = {https://doi.org/10.1016/S0267-3649(99)80075-2}, doi = {10.1016/S0267-3649(99)80075-2}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Warchus99c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jamia/BuckovichRR99, author = {Suzy A. Buckovich and Helga E. Rippen and Michael J. Rozen}, title = {Viewpoint: Driving Toward Guiding Principles: {A} Goal for Privacy, Confidentiality, and Security of Health Information}, journal = {J. Am. Medical Informatics Assoc.}, volume = {6}, number = {2}, pages = {122--133}, year = {1999}, url = {https://doi.org/10.1136/jamia.1999.0060122}, doi = {10.1136/JAMIA.1999.0060122}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jamia/BuckovichRR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cbms/Ting99, author = {T. C. Ting}, title = {Privacy and Confidentiality in Healthcare Delivery Information System}, booktitle = {12th {IEEE} Symposium on Computer-Based Medical Systems {(CBMS} '99). 18-20 June 1999, Stamford, CT, {USA}}, pages = {2}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CBMS.1999.781239}, doi = {10.1109/CBMS.1999.781239}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cbms/Ting99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmi/MoehrM98, author = {Jochen R. Moehr and James G. McDaniel}, title = {Adoption of security and confidentiality features in an operational community health information network: the Comox Valley experience - case example}, journal = {Int. J. Medical Informatics}, volume = {49}, number = {1}, pages = {81--87}, year = {1998}, url = {https://doi.org/10.1016/S1386-5056(98)00014-8}, doi = {10.1016/S1386-5056(98)00014-8}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmi/MoehrM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/informs/GopalGG98, author = {Ram D. Gopal and Paulo B. G{\'{o}}es and Robert S. Garfinkel}, title = {Interval Protection of Confidential Information in a Database}, journal = {{INFORMS} J. Comput.}, volume = {10}, number = {3}, pages = {309--322}, year = {1998}, url = {https://doi.org/10.1287/ijoc.10.3.309}, doi = {10.1287/IJOC.10.3.309}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/informs/GopalGG98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/FabreP97, author = {Jean{-}Charles Fabre and Tanguy P{\'{e}}rennou}, title = {Processing of confidential information in distributed systems by fragmentation}, journal = {Comput. Commun.}, volume = {20}, number = {3}, pages = {177--188}, year = {1997}, url = {https://doi.org/10.1016/S0140-3664(97)00005-4}, doi = {10.1016/S0140-3664(97)00005-4}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/FabreP97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HimdiS97, author = {T. F. Himdi and Ravi S. Sandhu}, title = {Lattice Based Models for Controlled Sharing of Confidential Information in the Saudi Hajj System}, booktitle = {13th Annual Computer Security Applications Conference {(ACSAC} 1997), 8-12 December 1997, San Diego, CA, {USA}}, pages = {164--174}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/CSAC.1997.646186}, doi = {10.1109/CSAC.1997.646186}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HimdiS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amia/BowenKRB97, author = {J. W. Bowen and J. C. Klimczak and M. Ruiz and M. Barnes}, title = {Design of access control methods for protecting the confidentiality of patient information in networked systems}, booktitle = {{AMIA} 1997, American Medical Informatics Association Annual Symposium, Nashville, TN, USA, October 25-29, 1997}, publisher = {{AMIA}}, year = {1997}, url = {https://knowledge.amia.org/amia-55142-a1997a-1.585351/t-001-1.587519/f-001-1.587520/a-009-1.587989/a-010-1.587986}, timestamp = {Wed, 17 Apr 2024 11:48:58 +0200}, biburl = {https://dblp.org/rec/conf/amia/BowenKRB97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/97/Landrock097, author = {Peter Landrock and John Williams}, editor = {Ross Anderson}, title = {Security and Confidentiality Issues Relating to the Electronic Data Interchange of Clinical Data}, booktitle = {Personal Medical Information - Security, Engineering, and Ethics}, pages = {165--173}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/978-3-642-59023-8\_13}, doi = {10.1007/978-3-642-59023-8\_13}, timestamp = {Fri, 15 May 2020 12:41:35 +0200}, biburl = {https://dblp.org/rec/books/sp/97/Landrock097.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/97/Rigby97, author = {Michael Rigby}, editor = {Ross Anderson}, title = {Keeping Confidence in Confidentiality: Linking Ethics, Efficacy, and Opportunity in Health Care Computing - {A} Case Study}, booktitle = {Personal Medical Information - Security, Engineering, and Ethics}, pages = {129--150}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/978-3-642-59023-8\_11}, doi = {10.1007/978-3-642-59023-8\_11}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/97/Rigby97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/97/RobertsTR097, author = {Ruth Roberts and Joyce K. Thomas and Michael Rigby and John Williams}, editor = {Ross Anderson}, title = {Practical Protection of Confidentiality in Acute Health Care}, booktitle = {Personal Medical Information - Security, Engineering, and Ethics}, pages = {67--78}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/978-3-642-59023-8\_6}, doi = {10.1007/978-3-642-59023-8\_6}, timestamp = {Fri, 22 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/97/RobertsTR097.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Jackson96, author = {Ian W. Jackson}, editor = {Ross J. Anderson}, title = {Anonymous Addresses and Confidentiality of Location}, booktitle = {Information Hiding, First International Workshop, Cambridge, UK, May 30 - June 1, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1174}, pages = {115--120}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-61996-8\_35}, doi = {10.1007/3-540-61996-8\_35}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/Jackson96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93dd, title = {Securing confidential information for competitive advantage}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {6}, pages = {281--285}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90040-T}, doi = {10.1016/0267-3649(93)90040-T}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93dd.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Parker93c, author = {Donn B. Parker}, title = {Confidentiality of Information and Personal Privacy}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {2}, number = {1}, pages = {13--17}, year = {1993}, url = {https://doi.org/10.1080/19393559308551337}, doi = {10.1080/19393559308551337}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Parker93c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/Biskup89, author = {Joachim Biskup}, editor = {David L. Spooner and Carl E. Landwehr}, title = {Protection of Privacy and Confidentiality in Medical Information Systems: Problems and Guidelines}, booktitle = {Database Security, {III:} Status and Prospects. Results of the {IFIP} {WG} 11.3 Workshop on Database Security, Monterey, California, USA, September 5-7, 1989}, pages = {13--23}, publisher = {North-Holland}, year = {1989}, timestamp = {Wed, 16 Jul 2014 19:05:09 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/Biskup89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Lewis88, author = {David P. Lewis}, title = {Protecting your confidential information}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {4}, pages = {28--31}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90150-1}, doi = {10.1016/0267-3649(88)90150-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Lewis88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tods/PalleyS87, author = {Michael A. Palley and Jeffrey S. Simonoff}, title = {The Use of Regression Methodology for the Compromise of Confidential Information in Statistical Databases}, journal = {{ACM} Trans. Database Syst.}, volume = {12}, number = {4}, pages = {593--608}, year = {1987}, url = {https://doi.org/10.1145/32204.42174}, doi = {10.1145/32204.42174}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tods/PalleyS87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigcas/Fletcher86, author = {Patricia T. Fletcher}, title = {Current issues in confidentiality: Computerized information systems, medical records, and patient rights}, journal = {{SIGCAS} Comput. Soc.}, volume = {16}, number = {2-3}, pages = {8--18}, year = {1986}, url = {https://doi.org/10.1145/15483.15485}, doi = {10.1145/15483.15485}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigcas/Fletcher86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iam/Roos81, author = {H. Roos}, title = {Confidentiality of information}, journal = {Inf. Manag.}, volume = {4}, number = {1}, pages = {17--21}, year = {1981}, url = {https://doi.org/10.1016/0378-7206(81)90021-5}, doi = {10.1016/0378-7206(81)90021-5}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iam/Roos81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/afips/Comber69, author = {Edward V. Comber}, title = {Management of confidential information}, booktitle = {American Federation of Information Processing Societies: Proceedings of the {AFIPS} '69 Fall Joint Computer Conference, November 18-20, 1969, Las Vegas, Navada, {USA}}, series = {{AFIPS} Conference Proceedings}, volume = {35}, pages = {135--143}, publisher = {{AFIPS} / {ACM}}, year = {1969}, url = {https://doi.org/10.1145/1478559.1478575}, doi = {10.1145/1478559.1478575}, timestamp = {Wed, 14 Apr 2021 16:50:07 +0200}, biburl = {https://dblp.org/rec/conf/afips/Comber69.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.