Detecting sensitive data exfiltration by an insider attack.
Yali LiuCherita L. CorbettKen ChiangRennie ArchibaldBiswanath MukherjeeDipak GhosalPublished in: CSIIRW (2008)
Keyphrases
- sensitive data
- malicious users
- privacy preserving
- data storage
- sensitive information
- smart card
- security concerns
- protection mechanisms
- information security
- data sharing
- data confidentiality
- confidential data
- privacy protection
- security threats
- personal data
- third party
- data privacy
- secret key
- database
- unauthorized access
- data management
- management system
- data model
- data mining