Sanitization (classified information)

Known as: Black highlighter, Sanitization, Document sanitizing 
Sanitization is the process of removing sensitive information from a document or other message (or sometimes encrypting it), so that the document may… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
Online social networks, such as Facebook, are increasingly utilized by many people. These networks allow users to publish details… (More)
  • table 1
  • table 2
  • figure 1
  • table 4
  • figure 2
Is this relevant?
Highly Cited
2009
Highly Cited
2009
On-line social networks, such as Facebook, are increasingly utilized by many users. These networks allow people to publish… (More)
  • table 1
  • figure 1
Is this relevant?
Highly Cited
2009
Highly Cited
2009
We consider private data analysis in the setting in which a trusted and trustworthy curator, having obtained a large data set… (More)
Is this relevant?
2008
2008
Sanitization of a document involves removing sensitive information from the document, so that it may be distributed to a broader… (More)
  • figure 1
Is this relevant?
Highly Cited
2008
Highly Cited
2008
We present a new class of statistical de- anonymization attacks against high-dimensional micro-data, such as individual… (More)
Is this relevant?
Highly Cited
2008
Highly Cited
2008
The efficacy of anomaly detection (AD) sensors depends heavily on the quality of the data used to train them. Artificial or… (More)
  • table 1
  • figure 1
  • figure 2
  • table 2
  • figure 3
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Web applications are ubiquitous, perform mission- critical tasks, and handle sensitive user data. Unfortunately, web applications… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 6
  • figure 9
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Web applications are popular targets of security attacks. One common type of such attacks is SQL injection, where an attacker… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
We continue a line of research initiated in [10, 11] on privacypreserving statistical databases. Consider a trusted server that… (More)
Is this relevant?
Highly Cited
2003
Highly Cited
2003
PUBLISHED BY THE IEEE COMPUTER SOCIETY ■ 1540-7993/03/$17.00 © 2003 IEEE ■ IEEE SECURITY & PRIVACY 17 A fundamental goal of… (More)
  • table 1
  • table 2
  • figure 1
  • table 3
  • table 4
Is this relevant?