2011
DOI: 10.1007/978-3-642-22589-5_22
|View full text |Cite
|
Sign up to set email alerts
|

On the Declassification of Confidential Documents

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
29
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(30 citation statements)
references
References 18 publications
1
29
0
Order By: Relevance
“…Daniel.et.al [9] proposed a system that uses trained classifiers to detect the sensitive entities. It consists of two tasks: private entity recognition and Private entity protection.…”
Section: Using Trained Classifiers To Identify Sensitive Termsmentioning
confidence: 99%
“…Daniel.et.al [9] proposed a system that uses trained classifiers to detect the sensitive entities. It consists of two tasks: private entity recognition and Private entity protection.…”
Section: Using Trained Classifiers To Identify Sensitive Termsmentioning
confidence: 99%
“…Daniel et.al [17] proposed a system based on the use of trained classifiers to find the sensitive terms. They used the term private entity to refer an entity which reveals information about the correspondents (organization or individual) directly or indirectly associated with the document.…”
Section: Figure 1: Overall System Architecturementioning
confidence: 99%
“…To overcome the limitations in [17] Sanchez et.al [7] proposed a method based on information theory and using web as corpus. The information content metric is used for identifying the sensitive terms in a document.…”
Section: Figure 1: Overall System Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…Freedom of Information (FOI) laws exist in many countries around the world, including the United Kingdom (UK) 1 and the United States of America (USA) 2 . FOI states that government documents should be open to the public.…”
Section: Introductionmentioning
confidence: 99%