期刊文献+

基于指纹和推导模型的泄密信息检测方案

A leak detection scheme based on fingerprint and derivation model
下载PDF
导出
摘要 预防发布信息泄密是公开发布信息安全领域面临的一个富有挑战的问题。信息之间存在的推导关系是导致泄密的关键因素,本文将这种推导关系作为检测泄密信息的重要依据,提出了基于指纹和推导模型的泄密信息检测方案。首先,将需要保密的信息(即秘密信息)分为篇章、段落、句子和词;然后,采用现有的指纹提取技术对篇章、段落、句子进行处理;再通过定义词的层次关系和推导关系,利用推导模型解决由于词的推导而导致的泄密问题;最后,给出了泄密信息的检测算法,并对该算法进行了理论分析和实验验证。 The prevention from the leak ofrelease information is a major challenge in the field ofpublic release information security. The derivation relation between the information is a critical factor that causes the leak. In this paper, taking the derivation relation as an important means of detecting leak, a leak detection scheme based on the fingerprint and derivation model is presented. First, the information to be confidential is divided into chapters, paragraphs, sentences and words. Then they are processed respectively. As to the chapters, paragraphs and sentences, the existing fingerprint extraction technique is used. As to the words, the derivation model is constructed by defining the hierarchical relationships and derivation ones. Finally, the leak detection algorithm is presented. Furthermore, theoretical analysis and experimental validation is done.
出处 《燕山大学学报》 CAS 2012年第6期511-518,共8页 Journal of Yanshan University
基金 国家自然科学基金资助项目(61070032) 黑龙江省自然科学基金资助项目(F201204) 齐齐哈尔大学青年教师科研启动项目(2010K-M13) 黑龙江省教育厅科学技术研究项目(12511603)
关键词 信息发布 安全检测 秘密信息 指纹 推导模型 information issue security detection secrete information fingerprint derivation model
  • 相关文献

参考文献18

  • 1Fung B C M, Wang Ke, Chen Rui, et al.. Privacy-preserving datapublishing: a survey on recent developments [J]. ACM ComputingSurveys, 2010,42 (4): 1-53.
  • 2Li Tiancheng, Li Ninghui, Zhang Jian, et al.. Slicing: a newapproach for privacy preserving data publishing [J]. IEEE Trans-actions on Knowledge and Data Engineering,2012,24 (3): 561-574.
  • 3Tristan A, Benjamin N, Philippe P. Towards a safe realization ofprivacy-preserving data publishing mechanisms [C] //Proceedingsof Mobile Data Management, Lulea, Sweden, 2011: 31-34.
  • 4Kim J. A method for limiting disclosure of microdata based on ran-dom noise and transformation [C] //Proceedings of the Section onSurvey Research Methods of the American Statistical Association,Washington DC, 1986: 370-374.
  • 5Palley M, Siminoff J, Regression methodology based disclosureof a statistical database [C] //Proceedings of the Section on SurveyResearch Methods of the American Statistical Association, Wash-ington DC, 1986: 382-387.
  • 6Samarati P, Sweeney L. Protecting privacy when disclosing infor-mation: K-anonymity and its enforcement through generalizationand suppression[R].SRI Computer Science Laboratory, 1998:1-19.
  • 7Sweeney L. -anonymity: a model for protecting privacy [J]. In-ternational Journal of Uncertainty,Fuzziness and Knowledge-Bas-ed Systems, 2002,10 (5): 557-570.
  • 8Sweeney L. Achieving jt-anonymity privacy protection using gen-eralization and suppression [J] .International Journal of Uncertainty,Fuzziness and Knowledge-Based Systems, 2002,10 (5): 571-588.
  • 9杨晓春,刘向宇,王斌,于戈.支持多约束的K-匿名化方法[J].软件学报,2006,17(5):1222-1231. 被引量:60
  • 10Park H, Kyuseok S. Approximate algorithms for -anonymity[C] //Proceedings of SIGMOD, Beijing, 2007: 67-78.

二级参考文献32

共引文献62

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部