Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 206,190,221 papers from all fields of science
Search
Sign In
Create Free Account
Confidentiality
Known as:
Commercial confidence
, Strict confidence
, Professional secrecy
Expand
Confidentiality involves a set of rules or a promise that limits access or places restrictions on certain types of information.
Wikipedia
Create Alert
Alert
Related topics
Related topics
50 relations
Asset (computer security)
Aurora Generator Test
Authenticated encryption
Basic access authentication
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2020
Highly Cited
2020
Design
Jim Euchner
Catalysis from A to Z
2020
Corpus ID: 218760367
Highly Cited
2012
Highly Cited
2012
ML Confidential: Machine Learning on Encrypted Data
T. Graepel
,
K. Lauter
,
M. Naehrig
ICISC
2012
Corpus ID: 6429534
We demonstrate that, by using a recently proposed leveled homomorphic encryption scheme, it is possible to delegate the execution…
Expand
Highly Cited
2011
Highly Cited
2011
CryptDB: protecting confidentiality with encrypted query processing
R. A. Popa
,
Catherine M. S. Redfield
,
N. Zeldovich
,
H. Balakrishnan
SOSP
2011
Corpus ID: 6323154
Online applications are vulnerable to theft of sensitive information because adversaries can exploit software bugs to gain access…
Expand
Highly Cited
2008
Highly Cited
2008
The Management of Confidentiality and Anonymity in Social Research
R. Wiles
,
G. Crow
,
S. Heath
,
Vikki Charles
2008
Corpus ID: 145054492
This article explores the ways in which social researchers manage issues of confidentiality and the contexts in which deliberate…
Expand
Highly Cited
2008
Highly Cited
2008
Multiple-Access Channels With Confidential Messages
Yingbin Liang
,
H. Poor
IEEE Transactions on Information Theory
2008
Corpus ID: 15327756
A discrete memoryless multiple-access channel (MAC) with confidential messages is studied, where two users attempt to transmit…
Expand
Highly Cited
2008
Highly Cited
2008
Guidelines for conducting and reporting case study research in software engineering
P. Runeson
,
Martin Höst
Empirical Software Engineering
2008
Corpus ID: 207144526
Case study is a suitable research methodology for software engineering research since it studies contemporary phenomena in its…
Expand
Highly Cited
2003
Highly Cited
2003
Balancing confidentiality and efficiency in untrusted relational DBMSs
E. Damiani
,
S. Vimercati
,
S. Jajodia
,
S. Paraboschi
,
P. Samarati
CCS '03
2003
Corpus ID: 3986842
The scope and character of today's computing environments are progressively shifting from traditional, one-on-one client-server…
Expand
Highly Cited
1997
Highly Cited
1997
Writing About Emotional Experiences as a Therapeutic Process
J. Pennebaker
1997
Corpus ID: 15516728
For the past decade, an increasing number of studies have demonstrated that when individuals write about emotional experiences…
Expand
Highly Cited
1978
Highly Cited
1978
Broadcast channels with confidential messages
I. Csiszár
,
J. Körner
IEEE Trans. Inf. Theory
1978
Corpus ID: 206733433
Given two discrete memoryless channels (DMC's) with a common input, it is desired to transmit private messages to receiver 1 rate…
Expand
Review
1973
Review
1973
Survey Research Methods
E. Babbie
1973
Corpus ID: 63702890
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
,
Terms of Service
, and
Dataset License
ACCEPT & CONTINUE