Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,258,702 papers from all fields of science
Search
Sign In
Create Free Account
Confidentiality
Known as:
Commercial confidence
, Strict confidence
, Professional secrecy
Expand
Confidentiality involves a set of rules or a promise that limits access or places restrictions on certain types of information.
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Asset (computer security)
Aurora Generator Test
Authenticated encryption
Basic access authentication
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2015
Review
2015
Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints
A. Mukherjee
Proceedings of the IEEE
2015
Corpus ID: 28307247
The Internet of Things (IoT) will feature pervasive sensing and control capabilities via a massive deployment of machine-type…
Expand
Highly Cited
2010
Highly Cited
2010
SP 800-122. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)
Erika McCallister
,
T. Grance
,
K. Scarfone
2010
Corpus ID: 150829370
The purpose of this document is to assist Federal agencies in protecting the confidentiality of personally identifiable…
Expand
Highly Cited
2008
Highly Cited
2008
The Management of Confidentiality and Anonymity in Social Research
R. Wiles
,
G. Crow
,
S. Heath
,
Vikki Charles
2008
Corpus ID: 145054492
This article explores the ways in which social researchers manage issues of confidentiality and the contexts in which deliberate…
Expand
Highly Cited
2007
Highly Cited
2007
Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions
Ruoheng Liu
,
I. Marić
,
P. Spasojevic
,
R. Yates
IEEE Transactions on Information Theory
2007
Corpus ID: 323626
We study information-theoretic security for discrete memoryless interference and broadcast channels with independent confidential…
Expand
Highly Cited
2005
Highly Cited
2005
Researching Entrepreneurship through Phenomenological Inquiry
J. Cope
2005
Corpus ID: 16451265
In recent years, the study of entrepreneurship and small business has witnessed an emerging body of research that operates within…
Expand
Highly Cited
2003
Highly Cited
2003
Contracts in Offshore Software Development: An Empirical Analysis
A. Gopal
,
K. Sivaramakrishnan
,
M. S. Krishnan
,
Tridas Mukhopadhyay
Management Sciences
2003
Corpus ID: 14531220
We study the determinants of contract choice in offshore software development projects and examine how the choice of contract and…
Expand
Highly Cited
2002
Highly Cited
2002
Computing Person and Firm Effects Using Linked Longitudinal Employer-Employee Data
J. Abowd
,
R. Creecy
,
F. Kramarz
2002
Corpus ID: 120270866
In this paper we provide the exact formulas for the direct least squares estimation of statistical models that include both…
Expand
Highly Cited
2002
Highly Cited
2002
INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks
Jing Deng
,
Richard O. Han
,
Shivakant Mishra
2002
Corpus ID: 1100811
This paper describes an INtrusion-tolerant routing protocol for wireless SEnsor NetworkS (INSENS). INSENS constructs forwarding…
Expand
Highly Cited
1996
Highly Cited
1996
Analysis of the SSL 3.0 protocol
D. Wagner
,
B. Schneier
1996
Corpus ID: 220893
The SSL protocol is intended to provide a practical, application-layer, widely applicable connection-oriented mechanism for…
Expand
Highly Cited
1959
Highly Cited
1959
Studies in the Mathematical Theory of Inventory and Production, by K.J. Arrow, S. Karlin, H. Scarf with contributions by M.J. Beckmann, J. Gessford, R.F. Muth. Stanford, California, Stanford…
A. Newhouse
,
K. Arrow
,
S. Karlin
,
H. Scarf
Bulletin de l'Institut de recherches économiques…
1959
Corpus ID: 124836744
The Assessment Division of The Applied Physics Laboratory has undertaken new responsibilities and is expanding its Senior…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE