Sanitization

Known as: Black highlighter, Document sanitizing, Unredacted 
Sanitization is the process of removing sensitive information from a document or other message (or sometimes encrypting it), so that the document may… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1986-2018
0204019862018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
By definition, fully homomorphic encryption (FHE) schemes support homomorphic decryption, and all known FHE constructions are… (More)
Is this relevant?
2011
2011
We present automata-based static string analysis techniques that automatically generate sanitization statements for patching… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2011
Highly Cited
2011
While most research on XSS defense has focused on techniques for securing existing applications and re-architecting browser… (More)
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
2010
2010
As users, corporations, and government agencies store more data in digital media, managing that data and access to it becomes… (More)
  • figure 1
  • table 1
  • figure 2
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Web applications are ubiquitous, perform mission- critical tasks, and handle sensitive user data. Unfortunately, web applications… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 6
  • figure 9
Is this relevant?
2008
2008
Sanitization of a document involves removing sensitive information from the document, so that it may be distributed to a broader… (More)
  • figure 1
Is this relevant?
Highly Cited
2008
Highly Cited
2008
The efficacy of anomaly detection (AD) sensors depends heavily on the quality of the data used to train them. Artificial or… (More)
  • table 1
  • figure 1
  • figure 2
  • table 2
  • figure 3
Is this relevant?
Highly Cited
2006
Highly Cited
2006
We continue a line of research initiated in [10, 11] on privacypreserving statistical databases. Consider a trusted server that… (More)
Is this relevant?
2006
2006
This work explores issues of computational disclosure control. We examine assumptions in the foundations of traditional problem… (More)
Is this relevant?
Highly Cited
2003
Highly Cited
2003
In this paper, we address the problem of protecting some sensitive knowledge in transactional databases. The challenge is on… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?