Proceedings of the 10th International Conference on Electronic Commerce 2008
DOI: 10.1145/1409540.1409592
|View full text |Cite
|
Sign up to set email alerts
|

Preventing information leakage between collaborating organisations

Abstract: Information sharing and protection against leakage is a critical problem especially for organisations having sensitive information. Sharing content between individuals in the same organisation extends to exchanging and sharing content between collaborating organisations. In this paper we propose a novel solution for preventing shared information between collaborating organisations from getting leaked to unauthorised users inside the distination organisation or out side it. In addition, once the content is in t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 15 publications
(19 citation statements)
references
References 11 publications
0
19
0
Order By: Relevance
“…If permissions 1 For future work, the Watermarking Agent shall be made able to detect valid changes of permissions tags, and re-watermark files accordingly. Add inotify watch descriptor for "write" and "create" operations within d i 4: end for 5: loop 6: f ← Read event from event descriptor W…”
Section: F Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…If permissions 1 For future work, the Watermarking Agent shall be made able to detect valid changes of permissions tags, and re-watermark files accordingly. Add inotify watch descriptor for "write" and "create" operations within d i 4: end for 5: loop 6: f ← Read event from event descriptor W…”
Section: F Resultsmentioning
confidence: 99%
“…A Watermarking Agent will be awakened upon receipt of signal from the Monitor Agent indicating that a new file has been created and will therefore need to be watermarked 1 . Algorithm 1 provides a broad representation of the operations performed by our Watermarking Agent.…”
Section: Implementation Of the Watermarking Agentmentioning
confidence: 99%
See 1 more Smart Citation
“…Corresponding protocols are also proposed to manage the domain creation, interaction and termination. The interaction among the domains is based on secure channels [12] to establish trustworthy self-management foundation.…”
Section: Related Workmentioning
confidence: 99%
“…Muntaha Alawneh and Imad M. Abbadi [5] have suggested a mechanism that enables the source organization to send content based on organization policy and requirements to another collaborating organization in such a manner that it could be accessed only by a specific group of users performing a particular task or by all device members in the destination organization. They have consummate this by providing a hardware-based root of trust for the master controller and organization devices exploiting trusted computing technology.…”
Section: Related Work: a Short Reviewmentioning
confidence: 99%