Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,389,629 papers from all fields of science
Search
Sign In
Create Free Account
Sanitization (classified information)
Known as:
Black highlighter
, Sanitization
, Document sanitizing
Expand
Sanitization is the process of removing sensitive information from a document or other message (or sometimes encrypting it), so that the document may…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
31 relations
Asset Disposal and Information Security Alliance
Backup
Bleep censor
Computer file
Expand
Broader (1)
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
Latent-Data Privacy Preserving With Customized Data Utility for Social Network Data
Zaobo He
,
Zhipeng Cai
,
Jiguo Yu
IEEE Transactions on Vehicular Technology
2018
Corpus ID: 6588350
Social network data can help with obtaining valuable insight into social behaviors and revealing the underlying benefits. New big…
Expand
Highly Cited
2014
Highly Cited
2014
Decontamination by ultrasound application in fresh fruits and vegetables
J.F.B. De São José
,
N. J. Andrade
,
A. M. Ramos
,
M. Vanetti
,
P. Stringheta
,
J. Chaves
2014
Corpus ID: 24148662
Highly Cited
2010
Highly Cited
2010
Private record matching using differential privacy
Ali Inan
,
Murat Kantarcioglu
,
G. Ghinita
,
E. Bertino
International Conference on Extending Database…
2010
Corpus ID: 504418
Private matching between datasets owned by distinct parties is a challenging problem with several applications. Private matching…
Expand
Review
2010
Review
2010
VEX: Vetting Browser Extensions for Security Vulnerabilities
Sruthi Bandhakavi
,
Samuel T. King
,
P. Madhusudan
,
M. Winslett
USENIX Security Symposium
2010
Corpus ID: 13755889
The browser has become the de facto platform for everyday computation. Among the many potential attacks that target or exploit…
Expand
Highly Cited
2010
Highly Cited
2010
Show me how you move and I will tell you who you are
S. Gambs
,
M. Killijian
,
Miguel Núñez del Prado Cortez
International Workshop on Security and Privacy in…
2010
Corpus ID: 15074567
Due to the emergence of geolocated applications, more and more mobility traces are generated on a daily basis and collected in…
Expand
Highly Cited
2009
Highly Cited
2009
A Novel Method for Privacy Preserving in Association Rule Mining Based on Genetic Algorithms
M. N. Dehkordi
,
K. Badie
,
A. Khademzadeh
Journal of Software
2009
Corpus ID: 8665795
Extracting of knowledge form large amount of data is an important issue in data mining systems. One of most important activities…
Expand
Highly Cited
2008
Highly Cited
2008
A Hybrid Approach to Private Record Linkage
Ali Inan
,
Murat Kantarcioglu
,
E. Bertino
,
M. Scannapieco
IEEE International Conference on Data Engineering
2008
Corpus ID: 6211836
Real-world entities are not always represented by the same set of features in different data sets. Therefore matching and linking…
Expand
Highly Cited
2007
Highly Cited
2007
Dare to share: Protecting sensitive knowledge with data sanitization
A. Amiri
Decision Support Systems
2007
Corpus ID: 7880815
Highly Cited
2007
Highly Cited
2007
Hiding informative association rule sets
Shyue-Liang Wang
,
Bhavesh Parikh
,
A. Jafari
Expert systems with applications
2007
Corpus ID: 11326273
Highly Cited
2004
Highly Cited
2004
Privacy-Preserving Sharing and Correlation of Security Alerts
P. Lincoln
,
Phillip A. Porras
,
Vitaly Shmatikov
USENIX Security Symposium
2004
Corpus ID: 33404358
We present a practical scheme for Internet-scale collaborative analysis of information security threats which provides strong…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE