Issue No. 06 - November/December (2009 vol. 7)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2009.183
Eric Bier , Palo Alto Research Center
Richard Chow , Palo Alto Research Center
Philippe Golle , Palo Alto Research Center
Tracy Holloway King , Microsoft
Jessica Staddon , Palo Alto Research Center
Frequent data leak reports in the press attest to the difficulty of identifying and protecting sensitive content. Redaction is particularly challenging because it seeks to protect documents by selectively removing sensitive portions of them, rather than by quarantining or encrypting the whole document. The authors review current redaction practice and technology and describe a prototype system that supports the natural redaction workflow and addresses some limitations of current technology. Their system supports all phases of the redaction process through the use of linguistic content analysis, an interactive user interface, and inference detection algorithms.
privacy, redaction, access control
E. Bier, P. Golle, T. H. King, J. Staddon and R. Chow, "The Rules of Redaction: Identify, Protect, Review (and Repeat)," in IEEE Security & Privacy, vol. 7, no. , pp. 46-53, 2009.