Confidentiality

Known as: Commercial confidence, Strict confidence, Professional secrecy 
Confidentiality involves a set of rules or a promise that limits access or places restrictions on certain types of information.
Wikipedia

Topic mentions per year

Topic mentions per year

1952-2017
05001000150019522016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
Due to the broadcast nature of radio propagation, the wireless air interface is open and accessible to both authorized and… (More)
  • table 1
  • figure 2
  • figure 3
  • table 2
  • table 3
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Online applications are vulnerable to theft of sensitive information because adversaries can exploit software bugs to gain access… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 6
  • figure 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
We study information-theoretic security for discrete memoryless interference and broadcast channels with independent confidential… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
A discrete memoryless multiple-access channel (MAC) with confidential messages is studied, where two users attempt to transmit… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2007
Highly Cited
2007
SIF (Servlet Information Flow) is a novel software framework for building high-assurance web applications, using language-based… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated… (More)
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Security is a critical issue in a mobile ad hoc network (MANET). We propose and investigate a novel scheme, security protocol for… (More)
  • figure 1
  • figure 2
  • figure 5
  • table 1
  • figure 6
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Laboratory researchers in economics assiduously protect the confidentiality of subjects. Why? Presumably because they fear that… (More)
  • table 1
  • figure 2
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
2002
Highly Cited
2002
The democratization of ubiquitous computing (access data anywhere, anytime, anyhow), the increasing connection of corporate… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1978
Highly Cited
1978
Absrfucr-Given two discrete memoryless channels @MC’s) with a common input, it is desired to transmit private messagea to… (More)
  • figure 1
Is this relevant?