The Community for Technology Leaders
RSS Icon
Issue No.06 - November/December (2009 vol.7)
pp: 46-53
Eric Bier , Palo Alto Research Center
Richard Chow , Palo Alto Research Center
Philippe Golle , Palo Alto Research Center
Jessica Staddon , Palo Alto Research Center
Frequent data leak reports in the press attest to the difficulty of identifying and protecting sensitive content. Redaction is particularly challenging because it seeks to protect documents by selectively removing sensitive portions of them, rather than by quarantining or encrypting the whole document. The authors review current redaction practice and technology and describe a prototype system that supports the natural redaction workflow and addresses some limitations of current technology. Their system supports all phases of the redaction process through the use of linguistic content analysis, an interactive user interface, and inference detection algorithms.
privacy, redaction, access control
Eric Bier, Richard Chow, Philippe Golle, Tracy Holloway King, Jessica Staddon, "The Rules of Redaction: Identify, Protect, Review (and Repeat)", IEEE Security & Privacy, vol.7, no. 6, pp. 46-53, November/December 2009, doi:10.1109/MSP.2009.183
1. D. Shea, "Military Gaffe Results in Classified Data Leak," Planet PDF, 6 May 2005; .
2. A. Kaplan, "A New Generation of Redacting Tools," Nat'l Law J., 14 Nov. 2002; .
3. T.H. King and J.T. Maxwell III, "Overlay Mechanisms for Multi-Level Deep Processing Applications," Proc. Grammar Eng. across Frameworks, CSLI Publications, 2007, pp. 182–202.
4. L. Sweeney, Uniqueness of Simple Demographics in the US Population, tech. report LIDAPWP4, Lab. for Int'l Data Privacy, Carnegie Mellon Univ., 2000.
5. P. Golle, "Revisiting the Uniqueness of Simple Demographics in the US Population," Workshop on Privacy in the Electronic Society, ACM Press, 2006; census.pdf.
6. X. Qian et al., "Detection and Elimination of Inference Channels in Multilevel Relational Database Systems," IEEE Symp. Security and Privacy, IEEE CS Press, 1993, p. 196.
7. L. Sweeney, "AI Technologies to Defeat Identity Theft Vulnerabilities," AAAI Spring Symp. AI Technologies for Homeland Security, AAAI, 2005; LIDAP-WP12.pdf.
8. J. Staddon, P. Golle, and B. Zimny, "Web-Based Inference Detection," Proc. Usenix Security 2007, ACM Press, 2007; USENIX07Full.pdf.
9. R. Chow, P. Golle, and J. Staddon, "Detecting Privacy Leaks Using Corpus-Based Association Rules," Proc. Int'l Conf. Knowledge Discovery and Data Mining (ACM KDD), ACM Press, 2008; .
10. E. Bier et al., "A Document Corpus Browser for In-Depth Reading," Proc. Joint Conf. Digital Libraries (JCDL 04), ACM Press, 2004, pp. 87–96.
11. E. Bier, E. Ishak, and E. Chi, "Entity Quick Click: Rapid Text Copying Based on Automatic Entity Extraction," Proc. Conf. Human Factors in Computing Systems (CHI 06), 2006; .
12. E. Bier, E. Ishak, and E.H. Chi, "Entity Workspace: An Evidence File that Aids Memory, Inference, and Reading," Proc. Int'l Conf. Intelligence and Security Informatics (ISI 06), IEEE CS Press, 2006, pp. 466–472.
13. J. Staddon et al., "A Content-Driven Access Control System," IDTrust 2008, ACM Press, 2008; .
14. J. Markoff, "Illuminating Blacked-Out Words, The New York Times,10 May 2004; .
15. R. Chow, I. Oberst, and J. Staddon, "Sanitization's Slippery Slope: The Design and Study of a Text Revision Assistant," 2009; a13-chow.pdf.
3 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool