[PDF][PDF] A proposal for an effective information flow control model for sharing and protecting sensitive information

M Arai, H Tanaka - … of the Seventh Australasian Conference on …, 2009 - academia.edu
Abstract Information leakage has become a serious problem for computer systems that
handle a company's sensitive information, such as intellectual properties and manufacturing …

[PDF][PDF] Towards a management framework to protect sensitive information during migrations

OA Ajigini, JA Van der Poll, JH Kroeze - … on Design and Modeling in Science …, 2012 - iiis.org
The protection of sensitive information during the migration from one computing platform to
another, eg from a Proprietary Platform to a Free Open Source Platform remains a …

Ultra dependable processor

S Sakai, M Goshima, H Irie - IEICE transactions on electronics, 2008 - search.ieice.org
This paper presents the processor architecture which provides much higher level
dependability than the current ones. The features of it are:(1) fault tolerance and secure …

Method for detecting remaining files that contain copied data by monitoring clipboard and directory

C Ishizawa, R Sato, M Nishida - … Journal of the Society of Materials …, 2013 - jstage.jst.go.jp
This paper focuses on information leaks caused by the human mistake of forgetting to delete
copied files from portable storage media. We propose a processing method that obtains …

ディレクトリの変更履歴およびハッシュ値に基づいた残留ファイルの検出手法

石沢千佳子, 安藤優, 西田眞 - 電気学会論文誌C (電子・情報・システム …, 2010 - jstage.jst.go.jp
抄録 There are a lot of information leakages because the files are copied from the removable
storage medium and are left in the storage unit of personal computer without deleting. In …