Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Information sensitivity

Known as: Sensitivity (information), Sensitive information, Sensitivity indicator 
Information sensitivity is the control of access to information or knowledge that might result in loss of an advantage or level of security if… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
As our professional, social, and financial existences become increasingly digitized and as our government, healthcare, and… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Reluctance to provide personal health information could impede the success of web-based healthcare services. This paper focuses… Expand
Is this relevant?
Highly Cited
2010
Highly Cited
2010
As Cloud Computing becomes prevalent, sensitive information are being increasingly centralized into the cloud. For the protection… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Operators of online social networks are increasingly sharing potentially sensitive information about users and their… Expand
  • figure 1
  • figure 4
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2008
Highly Cited
2008
We present a new class of statistical de- anonymization attacks against high-dimensional micro-data, such as individual… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
We continue a line of research initiated in [10, 11] on privacy-preserving statistical databases. Consider a trusted server that… Expand
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Releasing person-specific data in its most specific state poses a threat to individual privacy. This paper presents a practical… Expand
  • figure 1
  • table 1
  • figure 2
  • table 2
  • table 4
Is this relevant?
Highly Cited
2003
Highly Cited
2003
As location-aware applications begin to track our movements in the name of convenience, how can we protect our privacy? This… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
The ability of attackers to rapidly gain control of vast numbers of Internet hosts poses an immense risk to the overall security… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1978
Highly Cited
1978
Encryption is a well—known technique for preserving the privacy of sensitive information. One of the basic, apparently inherent… Expand
  • figure 2
Is this relevant?