Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,257,093 papers from all fields of science
Search
Sign In
Create Free Account
Information sensitivity
Known as:
Sensitivity (information)
, Sensitive information
, Sensitivity indicator
Expand
Information sensitivity is the control of access to information or knowledge that might result in loss of an advantage or level of security if…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
Access control
Application security
Compartmentalization (information security)
Confidentiality
Expand
Broader (3)
Computer security
Data security
Information
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
Patient-centric authorization framework for electronic healthcare services
Jing Jin
,
Gail-Joon Ahn
,
Hongxin Hu
,
M. Covington
,
Xinwen Zhang
Computers & security
2011
Corpus ID: 14191863
Highly Cited
2009
Highly Cited
2009
Desktop to cloud transformation planning
K. Beaty
,
Andrzej Kochut
,
Hidayatullah Shaikh
IEEE International Symposium on Parallel…
2009
Corpus ID: 19015681
Traditional desktop delivery model is based on a large number of distributed PCs executing operating system and desktop…
Expand
2008
2008
A Profile Anonymization Model for Privacy in a Personalized Location Based Service Environment
Heechang Shin
,
V. Atluri
,
Jaideep Vaidya
International Conference on Mobile Data…
2008
Corpus ID: 17224543
Location based services (LBS) aim at delivering point of need information. Personalization and customization of such services…
Expand
2008
2008
Policy-Based Information Sharing in Publish/Subscribe Middleware
Jatinder Singh
,
L. Vargas
,
J. Bacon
,
K. Moody
IEEE Workshop on Policies for Distributed Systems…
2008
Corpus ID: 14621929
Healthcare is a highly collaborative environment, where the active sharing of information is central to the care process. Due to…
Expand
Highly Cited
2004
Highly Cited
2004
Secure XML Publishing without Information Leakage in the Presence of Data Inference
Xiaochun Yang
,
Chen Li
Very Large Data Bases Conference
2004
Corpus ID: 8663466
2004
2004
A methodology for allocating transmission losses due to cross-border trades
Janusz W. Bialek
,
S. Ziemianek
,
Robin Wallace
IEEE Transactions on Power Systems
2004
Corpus ID: 25425755
Transmission pricing of cross-border trades is often difficult since individual countries may use incompatible internal…
Expand
Highly Cited
2001
Highly Cited
2001
A method to compress and anonymize packet traces
M. Peuhkuri
International Memory Workshop
2001
Corpus ID: 1040777
Data volume and privacy issues are one of problems related to large-scale packet capture. Utilizing flow nature of Internet…
Expand
1996
1996
Distributed shortest-path protocols for time-dependent networks
A. Orda
,
R. Rom
Distributed computing
1996
Corpus ID: 6397612
Abstract. This paper addresses algorithms for networks whose behavior changes with time according to known functions. Because the…
Expand
1993
1993
VINCI: VLSI implementation of the new secret-key block cipher IDEA
A. Curiger
,
H. Bonnenberg
,
R. Zimmermann
,
N. Felber
,
H. Kaeslin
,
W. Fichtner
Proceedings of IEEE Custom Integrated Circuits…
1993
Corpus ID: 60727957
A VLSI implementation of a novel secret-key block cipher is presented. Security considerations lead to novel system concepts in…
Expand
Highly Cited
1969
Highly Cited
1969
Tissue residues of dieldrin in relation to mortality in birds and mammals
W. Stickel
,
L. Stickel
,
J. Spann
1969
Corpus ID: 81159549
An experiment was performed with Coturnix to learn what residue levels were indicative of death from dieldrin poisoning. Birds…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE