Automated Security Test by Using Formal Threat Models on Leakage Detection

The data distributors work is to give sensitive data to a set of presumably trusted third party agents. The data i.e., sent to these third parties are available on the unauthorized places like web and or some ones systems, due to data leakage. The distributor must know the way the data was leaked from one or more agents instead of as opposed to having been independently gathered by other means. The authors' new proposal on data allocation strategies will improve the probability of identifying leakages along with Security attacks typically result from unintended behaviors or invalid inputs.

Provided by: IJAIR Topic: Data Management Date Added: Feb 2013 Format: PDF

Find By Topic