scispace - formally typeset

Data security

About: Data security is a(n) research topic. Over the lifetime, 15013 publication(s) have been published within this topic receiving 206831 citation(s). more


Journal ArticleDOI: 10.1109/TKDE.2008.239
Haibo He1, E.A. Garcia1Institutions (1)
Abstract: With the continuous expansion of data availability in many large-scale, complex, and networked systems, such as surveillance, security, Internet, and finance, it becomes critical to advance the fundamental understanding of knowledge discovery and analysis from raw data to support decision-making processes. Although existing knowledge discovery and data engineering techniques have shown great success in many real-world applications, the problem of learning from imbalanced data (the imbalanced learning problem) is a relatively new challenge that has attracted growing attention from both academia and industry. The imbalanced learning problem is concerned with the performance of learning algorithms in the presence of underrepresented data and severe class distribution skews. Due to the inherent complex characteristics of imbalanced data sets, learning from such data requires new understandings, principles, algorithms, and tools to transform vast amounts of raw data efficiently into information and knowledge representation. In this paper, we provide a comprehensive review of the development of research in learning from imbalanced data. Our focus is to provide a critical review of the nature of the problem, the state-of-the-art technologies, and the current assessment metrics used to evaluate learning performance under the imbalanced learning scenario. Furthermore, in order to stimulate future research in this field, we also highlight the major opportunities and challenges, as well as potential important research directions for learning from imbalanced data. more

Topics: Active learning (58%), Knowledge extraction (54%), Raw data (53%) more

5,368 Citations

Journal ArticleDOI: 10.1109/2.485845
01 Feb 1996-IEEE Computer
Abstract: Security administration of large systems is complex, but it can be simplified by a role-based access control approach. This article explains why RBAC is receiving renewed attention as a method of security administration and review, describes a framework of four reference models developed to better understand RBAC and categorizes different implementations, and discusses the use of RBAC to manage itself. more

Topics: Role-based access control (65%), Role hierarchy (57%), Mandatory access control (56%) more

5,261 Citations

Open accessProceedings ArticleDOI: 10.1109/SP.2007.11
John Bethencourt1, Amit Sahai2, Brent Waters3Institutions (3)
20 May 2007-
Abstract: In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or attributes. Currently, the only method for enforcing such policies is to employ a trusted server to store the data and mediate access control. However, if any server storing the data is compromised, then the confidentiality of the data will be compromised. In this paper we present a system for realizing complex access control on encrypted data that we call ciphertext-policy attribute-based encryption. By using our techniques encrypted data can be kept confidential even if the storage server is untrusted; moreover, our methods are secure against collusion attacks. Previous attribute-based encryption systems used attributes to describe the encrypted data and built policies into user's keys; while in our system attributes are used to describe a user's credentials, and a party encrypting data determines a policy for who can decrypt. Thus, our methods are conceptually closer to traditional access control methods such as role-based access control (RBAC). In addition, we provide an implementation of our system and give performance measurements. more

  • Table 1. Possible query types from the adversary.
    Table 1. Possible query types from the adversary.
  • Figure 1. Policy tree implementing the integer comparison “a < 11”.
    Figure 1. Policy tree implementing the integer comparison “a < 11”.
  • Figure 3. Performance of the cpabe toolkit.
    Figure 3. Performance of the cpabe toolkit.
  • Figure 2. Example usage of the cpabe toolkit. Two private keys are issued for various sets of attributes (normal and numerical) using cpabe-keygen. A document is encrypted under a complex policy using cpabe-enc.
    Figure 2. Example usage of the cpabe toolkit. Two private keys are issued for various sets of attributes (normal and numerical) using cpabe-keygen. A document is encrypted under a complex policy using cpabe-enc.
Topics: Attribute-based encryption (69%), On-the-fly encryption (64%), Client-side encryption (64%) more

3,825 Citations

Open accessJournal ArticleDOI: 10.1109/JSAC.2002.806121
Andrei Sabelfeld1, Andrew C. Myers1Institutions (1)
Abstract: Current standard security practices do not provide substantial assurance that the end-to-end behavior of a computing system satisfies important security policies such as confidentiality. An end-to-end confidentiality policy might assert that secret input data cannot be inferred by an attacker through the attacker's observations of system output; this policy regulates information flow. Conventional security mechanisms such as access control and encryption do not directly address the enforcement of information-flow policies. Previously, a promising new approach has been developed: the use of programming-language techniques for specifying and enforcing information-flow policies. In this paper, we survey the past three decades of research on information-flow security, particularly focusing on work that uses static program analysis to enforce information-flow policies. We give a structured view of work in the area and identify some important open challenges. more

  • Fig. 2. Command syntax.
    Fig. 2. Command syntax.
  • Fig. 1. An implicit flow.
    Fig. 1. An implicit flow.
  • Fig. 4. Evolution of language-based information flow.
    Fig. 4. Evolution of language-based information flow.
  • Fig. 3. Security-type system.
    Fig. 3. Security-type system.

1,969 Citations

Open accessBook
Dorothy E. Denning1Institutions (1)
01 Jan 1982-
Abstract: From the Preface (See Front Matter for full Preface) Electronic computers have evolved from exiguous experimental enterprises in the 1940s to prolific practical data processing systems in the 1980s. As we have come to rely on these systems to process and store data, we have also come to wonder about their ability to protect valuable data. Data security is the science and study of methods of protecting data in computer and communication systems from unauthorized disclosure and modification. The goal of this book is to introduce the mathematical principles of data security and to show how these principles apply to operating systems, database systems, and computer networks. The book is for students and professionals seeking an introduction to these principles. There are many references for those who would like to study specific topics further. Data security has evolved rapidly since 1975. We have seen exciting developments in cryptography: public-key encryption, digital signatures, the Data Encryption Standard (DES), key safeguarding schemes, and key distribution protocols. We have developed techniques for verifying that programs do not leak confidential data, or transmit classified data to users with lower security clearances. We have found new controls for protecting data in statistical databases--and new methods of attacking these databases. We have come to a better understanding of the theoretical and practical limitations to security. more

Topics: Data security (67%), Security service (62%), Cloud computing security (61%) more

1,922 Citations

No. of papers in the topic in previous years

Top Attributes

Show by:

Topic's top 5 most impactful authors

Bhavani Thuraisingham

22 papers, 266 citations

Elisa Bertino

22 papers, 782 citations

Jianfeng Ma

12 papers, 51 citations

Robert H. Deng

10 papers, 589 citations

Lidia Ogiela

8 papers, 32 citations

Network Information
Related Topics (5)

74.7K papers, 867.1K citations

92% related
Access control

32.6K papers, 475K citations

92% related
Cloud computing security

27.1K papers, 511.8K citations

91% related
Information privacy

25.4K papers, 579.6K citations

91% related
Intrusion detection system

28.4K papers, 509.5K citations

91% related