A Survey of Data Leakage Detection and Prevention SolutionsData Leakage/Misuse Scenarios
A Survey of Data Leakage Detection and Prevention Solutions: Data Leakage/Misuse Scenarios
Shabtai, Asaf; Elovici, Yuval; Rokach, Lior
2012-02-14 00:00:00
[Data leakage incidents can be characterized based on the following attributes: where the leakage occurred, who caused the leakage, what was leaked (data state), how was access to the data gained, and how did the data leak. These parameters affect decision making for data-leakage defense measures.]
http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.pnghttp://www.deepdyve.com/lp/springer-journals/a-survey-of-data-leakage-detection-and-prevention-solutions-data-FBZTyoRJd6
A Survey of Data Leakage Detection and Prevention SolutionsData Leakage/Misuse Scenarios
[Data leakage incidents can be characterized based on the following attributes: where the leakage occurred, who caused the leakage, what was leaked (data state), how was access to the data gained, and how did the data leak. These parameters affect decision making for data-leakage defense measures.]
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.