Data Management

Data Leakage Detection

Download Now Free registration required

Executive Summary

In a perfect world there would be no need to hand over sensitive data to agents that may unknowingly or maliciously leak it. And even if one had to hand over sensitive data, in a perfect world one could watermark each object so that one could trace its origins with absolute certainty. However, in many cases one must indeed work with agents that may not be 100% trusted, and one may not be certain if a leaked object came from an agent or from some other source.

  • Format: PDF
  • Size: 562.8 KB