Using Unobtrusive Techniques for Detecting Leakage of Data

Download Now
Provided by: International Journal of Computer Science and Network
Topic: Data Management
Format: PDF
While doing business, there are situations when some important information or data should be handed over to some third parties. The data important to organization must be secured but the third parties are not that careful about the data. So there is possibility that the data gets leaked. Here in this paper the authors are considering the chances that the third party is responsible for the leakage. They propose data allocation strategies (across the agents) that improve the probability of identifying leakages.
Download Now

Find By Topic