Date Added: Jun 2012
This paper presents a formal method for representing and detecting inconsistencies of combined secrecy models is to detect when the PC distributor's sensitive data has been leaked by their agents, and if possible to identify the agent that leaked the data. Data leakage is a silent type of threat. This sensitive information can be electronically distributed via e-mail, Web sites, FTP, instant messaging, spreadsheets, databases, and any other electronic means available - all without the people knowledge. Data allocation strategies (across the agents) are proposed that improve the probability of identifying leakages.