Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,065,731 papers from all fields of science
Search
Sign In
Create Free Account
Information sensitivity
Known as:
Sensitivity (information)
, Sensitive information
, Sensitivity indicator
Expand
Information sensitivity is the control of access to information or knowledge that might result in loss of an advantage or level of security if…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
Access control
Application security
Compartmentalization (information security)
Confidentiality
Expand
Broader (3)
Computer security
Data security
Information
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2015
Review
2015
Protecting Privacy in Data Release
S. Vimercati
,
S. Foresti
,
G. Livraga
,
P. Samarati
Advances in Information Security
2015
Corpus ID: 17321163
The evolution of the Information and Communication Technology has radically changed our electronic lives, making information the…
Expand
2012
2012
Tag Based Client Side Detection of Content Sniffing Attacks with File Encryption and File Splitter Technique
Syed Imran
,
Ahmed Qadri
,
Prof. Kiran Pandey
2012
Corpus ID: 16209516
In this paper we provide a security framework for server and client side. In this we provide some prevention methods which will…
Expand
2011
2011
Old, new, borrowed, blue --: a perspective on the evolution of mobile platform security architectures
Kari Kostiainen
,
E. Reshetova
,
Jan-Erik Ekberg
,
N. Asokan
Conference on Data and Application Security and…
2011
Corpus ID: 14182725
The recent dramatic increase in the popularity of "smartphones" has led to increased interest in smartphone security research…
Expand
2009
2009
A UML 2.0 profile to define security requirements for Data Warehouses
J. Trujillo
,
E. Soler
,
E. Fernández-Medina
,
M. Piattini
Comput. Stand. Interfaces
2009
Corpus ID: 30101660
2009
2009
The SCIFC Model for Information Flow Control in Web Service Composition
Wei She
,
I. Yen
,
B. Thuraisingham
,
E. Bertino
IEEE International Conference on Web Services
2009
Corpus ID: 2270523
Existing web service access control models focus on individual web services, and do not consider service composition. In…
Expand
Highly Cited
2009
Highly Cited
2009
Desktop to cloud transformation planning
K. Beaty
,
Andrzej Kochut
,
Hidayatullah Shaikh
IEEE International Symposium on Parallel…
2009
Corpus ID: 19015681
Traditional desktop delivery model is based on a large number of distributed PCs executing operating system and desktop…
Expand
2006
2006
Event-Based Activity Tracking in Work Environments
T. Stiefmeier
,
Clemens Lombriser
,
D. Roggen
,
H. Junker
,
G. Ogris
,
G. Troester
2006
Corpus ID: 18738311
Wearable computers aim to empower people by providing relevant information at appropriate time. This context-based information…
Expand
2004
2004
An ambient, personalised, and context-sensitive information system for mobile users
A. Göker
,
S. Watt
,
+5 authors
H. Cumming
EUSAI '04
2004
Corpus ID: 16326549
In this demonstration, we will show a context-aware information system intended for mobile users. The demonstration involves…
Expand
Highly Cited
2001
Highly Cited
2001
Multipath routing in mobile ad hoc networks or how to route in the presence of frequent topology changes
A. Tsirigos
,
Zygmunt J. Haas
MILCOM Proceedings Communications for Network…
2001
Corpus ID: 61248046
We propose a framework for multipath routing in mobile ad hoc networks (MANETs) and provide its analytical evaluation. The…
Expand
Highly Cited
1999
Highly Cited
1999
Enhanced privacy and authentication for the global system for mobile communications
Chii-Hwa Lee
,
M. Hwang
,
Wei-Pang Yang
Wirel. Networks
1999
Corpus ID: 187577
The Global System for Mobile Communications (GSM) is widely recognized as the modern digital mobile network architecture…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE