Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 217,275,344 papers from all fields of science
Search
Sign In
Create Free Account
Confidentiality
Known as:
Commercial confidence
, Strict confidence
, Professional secrecy
Expand
Confidentiality involves a set of rules or a promise that limits access or places restrictions on certain types of information.
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Asset (computer security)
Aurora Generator Test
Authenticated encryption
Basic access authentication
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
Bulletproofs: Short Proofs for Confidential Transactions and More
Benedikt Bünz
,
Jonathan Bootle
,
D. Boneh
,
Andrew Poelstra
,
Pieter Wuille
,
Gregory Maxwell
IEEE Symposium on Security and Privacy
2018
Corpus ID: 3337741
We propose Bulletproofs, a new non-interactive zero-knowledge proof protocol with very short proofs and without a trusted setup…
Expand
Review
2013
Review
2013
Technical review and evaluation of the economics of water desalination: Current and future challenges for better water supply sustainability
N. Ghaffour
,
T. Missimer
,
G. Amy
2013
Corpus ID: 3900528
Highly Cited
2012
Highly Cited
2012
ML Confidential: Machine Learning on Encrypted Data
T. Graepel
,
K. Lauter
,
M. Naehrig
International Conference on Information Security…
2012
Corpus ID: 6429534
We demonstrate that, by using a recently proposed leveled homomorphic encryption scheme, it is possible to delegate the execution…
Expand
Highly Cited
2012
Highly Cited
2012
Addressing cloud computing security issues
Dimitrios Zissis
,
D. Lekkas
Future generations computer systems
2012
Corpus ID: 17388617
Highly Cited
2011
Highly Cited
2011
CryptDB: protecting confidentiality with encrypted query processing
Raluca A. Popa
,
C. M. S. Redfield
,
Nickolai Zeldovich
,
H. Balakrishnan
Symposium on Operating Systems Principles
2011
Corpus ID: 6323154
Online applications are vulnerable to theft of sensitive information because adversaries can exploit software bugs to gain access…
Expand
Highly Cited
2009
Highly Cited
2009
Guidelines for conducting and reporting case study research in software engineering
P. Runeson
,
Martin Höst
Empirical Software Engineering
2009
Corpus ID: 207144526
Case study is a suitable research methodology for software engineering research since it studies contemporary phenomena in its…
Expand
Highly Cited
2008
Highly Cited
2008
The Management of Confidentiality and Anonymity in Social Research
R. Wiles
,
G. Crow
,
S. Heath
,
Vikki Charles
2008
Corpus ID: 145054492
This article explores the ways in which social researchers manage issues of confidentiality and the contexts in which deliberate…
Expand
Highly Cited
2005
Highly Cited
2005
Confidentiality and Information Sharing in Supply Chain Coordination
Lode Li
,
Hongtao Zhang
Management Sciences
2005
Corpus ID: 5886260
We consider information sharing in a decentralized supply chain where one manufacturer supplies to multiple retailers competing…
Expand
Highly Cited
1997
Highly Cited
1997
Writing About Emotional Experiences as a Therapeutic Process
J. Pennebaker
1997
Corpus ID: 15516728
For the past decade, an increasing number of studies have demonstrated that when individuals write about emotional experiences…
Expand
Highly Cited
1978
Highly Cited
1978
Broadcast channels with confidential messages
I. Csiszár
,
J. Körner
IEEE Transactions on Information Theory
1978
Corpus ID: 206733433
Given two discrete memoryless channels (DMC's) with a common input, it is desired to transmit private messages to receiver 1 rate…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE