A Model for Identifying Guilty Agents in Data Transmission

This paper presents a formal method for representing and detecting inconsistencies of combined secrecy models is to detect when the PC distributor's sensitive data has been leaked by their agents, and if possible to identify the agent that leaked the data. Data leakage is a silent type of threat. This sensitive information can be electronically distributed via e-mail, Web sites, FTP, instant messaging, spreadsheets, databases, and any other electronic means available - all without the people knowledge. Data allocation strategies (across the agents) are proposed that improve the probability of identifying leakages.

Provided by: International Journal of Advanced Research in Computer Engineering & Technology Topic: Data Management Date Added: Jun 2012 Format: PDF

Download Now

Find By Topic