{"title":"挤出防含量监测过滤系统","authors":"Ajay Sharma, Monika Bhalla, Kriti Baweja","doi":"10.1109/INCITE.2016.7857585","DOIUrl":null,"url":null,"abstract":"In order to do business it becomes a necesssity to share sensitive piece of information with certain not so trusted agents otherwise known as outsourcing of data or work. This sharing of data cannot be avoided but the process of it not getting leaked is major point of concern from Data Security point of view. In this paper we have tried to suggest a cumulative method of strategies to protect Sensitive data from getting into wrong hands and to identify guilty agents.","PeriodicalId":59618,"journal":{"name":"下一代","volume":"190 1","pages":"37-39"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Extrusion prevention content monitoring filtering system\",\"authors\":\"Ajay Sharma, Monika Bhalla, Kriti Baweja\",\"doi\":\"10.1109/INCITE.2016.7857585\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In order to do business it becomes a necesssity to share sensitive piece of information with certain not so trusted agents otherwise known as outsourcing of data or work. This sharing of data cannot be avoided but the process of it not getting leaked is major point of concern from Data Security point of view. In this paper we have tried to suggest a cumulative method of strategies to protect Sensitive data from getting into wrong hands and to identify guilty agents.\",\"PeriodicalId\":59618,\"journal\":{\"name\":\"下一代\",\"volume\":\"190 1\",\"pages\":\"37-39\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"下一代\",\"FirstCategoryId\":\"1092\",\"ListUrlMain\":\"https://doi.org/10.1109/INCITE.2016.7857585\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"下一代","FirstCategoryId":"1092","ListUrlMain":"https://doi.org/10.1109/INCITE.2016.7857585","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Extrusion prevention content monitoring filtering system
In order to do business it becomes a necesssity to share sensitive piece of information with certain not so trusted agents otherwise known as outsourcing of data or work. This sharing of data cannot be avoided but the process of it not getting leaked is major point of concern from Data Security point of view. In this paper we have tried to suggest a cumulative method of strategies to protect Sensitive data from getting into wrong hands and to identify guilty agents.