Information sensitivity

Known as: Sensitive information, Sensitivity, Sensitivity indicator 
Information sensitivity is the control of access to information or knowledge that might result in loss of an advantage or level of security if… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1967-2017
020040060019672017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
The field of network and Internet security consists of measures to deter, prevent, detect, and correct security violations that… (More)
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Online applications are vulnerable to theft of sensitive information because adversaries can exploit software bugs to gain access… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 6
  • figure 5
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Encryption is a well—known technique for preserving the privacy of sensitive information. One of the basic, apparently inherent… (More)
  • figure 2
Is this relevant?
Highly Cited
2009
Highly Cited
2009
JavaScript-based browser extensions (JSEs) enhance the core functionality of web browsers by improving their look and feel, and… (More)
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Operators of online social networks are increasingly sharing potentially sensitive information about users and their… (More)
  • figure 1
  • figure 4
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2008
Highly Cited
2008
We present a new class of statistical de- anonymization attacks against high-dimensional micro-data, such as individual… (More)
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Cross-site scripting (XSS) is an attack against web applications in which scripting code is injected into the output of an… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 7
Is this relevant?
Highly Cited
2006
Highly Cited
2006
We continue a line of research initiated in [10, 11] on privacypreserving statistical databases. Consider a trusted server that… (More)
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Publishing data about individuals without revealing sensitive information about them is an important problem. In recent years, a… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
M any countries recognize privacy as a right and have attempted to codify it in law. The first known piece of privacy legislation… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?