Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,400,060 papers from all fields of science
Search
Sign In
Create Free Account
Information sensitivity
Known as:
Sensitivity (information)
, Sensitive information
, Sensitivity indicator
Expand
Information sensitivity is the control of access to information or knowledge that might result in loss of an advantage or level of security if…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
Access control
Application security
Compartmentalization (information security)
Confidentiality
Expand
Broader (3)
Computer security
Data security
Information
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2015
Review
2015
Protecting Privacy in Data Release
S. Vimercati
,
S. Foresti
,
G. Livraga
,
P. Samarati
Advances in Information Security
2015
Corpus ID: 17321163
The evolution of the Information and Communication Technology has radically changed our electronic lives, making information the…
Expand
2015
2015
Forensic Taxonomy of Popular Android mHealth Apps
Abdullah Azfar
,
Kim-Kwang Raymond Choo
,
Lin Liu
Americas Conference on Information Systems
2015
Corpus ID: 12002296
Mobile health applications (or mHealth apps, as they are commonly known) are increasingly popular with both individual end users…
Expand
2012
2012
Tag Based Client Side Detection of Content Sniffing Attacks with File Encryption and File Splitter Technique
Syed Imran
,
Ahmed Qadri
,
Prof. Kiran Pandey
2012
Corpus ID: 16209516
In this paper we provide a security framework for server and client side. In this we provide some prevention methods which will…
Expand
2011
2011
Old, new, borrowed, blue --: a perspective on the evolution of mobile platform security architectures
Kari Kostiainen
,
E. Reshetova
,
Jan-Erik Ekberg
,
N. Asokan
Conference on Data and Application Security and…
2011
Corpus ID: 14182725
The recent dramatic increase in the popularity of "smartphones" has led to increased interest in smartphone security research…
Expand
Highly Cited
2009
Highly Cited
2009
Desktop to cloud transformation planning
K. Beaty
,
Andrzej Kochut
,
Hidayatullah Shaikh
IEEE International Symposium on Parallel…
2009
Corpus ID: 19015681
Traditional desktop delivery model is based on a large number of distributed PCs executing operating system and desktop…
Expand
2008
2008
Policy-Based Information Sharing in Publish/Subscribe Middleware
Jatinder Singh
,
L. Vargas
,
J. Bacon
,
K. Moody
IEEE Workshop on Policies for Distributed Systems…
2008
Corpus ID: 14621929
Healthcare is a highly collaborative environment, where the active sharing of information is central to the care process. Due to…
Expand
2004
2004
A methodology for allocating transmission losses due to cross-border trades
Janusz W. Bialek
,
S. Ziemianek
,
Robin Wallace
IEEE Transactions on Power Systems
2004
Corpus ID: 25425755
Transmission pricing of cross-border trades is often difficult since individual countries may use incompatible internal…
Expand
Highly Cited
2002
Highly Cited
2002
A flexible, privacy-preserving authentication framework for ubiquitous computing environments
He Zheng
,
Jin Kwak
,
Kyungho Son
,
Wansuk Lee
,
Seungjoo Kim
,
Dongho Won
Proceedings 22nd International Conference on…
2002
Corpus ID: 2898992
The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous…
Expand
Highly Cited
2001
Highly Cited
2001
A method to compress and anonymize packet traces
M. Peuhkuri
International Memory Workshop
2001
Corpus ID: 1040777
Data volume and privacy issues are one of problems related to large-scale packet capture. Utilizing flow nature of Internet…
Expand
1993
1993
VINCI: VLSI implementation of the new secret-key block cipher IDEA
A. Curiger
,
H. Bonnenberg
,
R. Zimmermann
,
N. Felber
,
H. Kaeslin
,
W. Fichtner
Proceedings of IEEE Custom Integrated Circuits…
1993
Corpus ID: 60727957
A VLSI implementation of a novel secret-key block cipher is presented. Security considerations lead to novel system concepts in…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE