The rules of redaction: identify, protect, review (and repeat)

Details

Event IEEE Security and Privacy Magazine

Authors

Chow, Richard
Golle, Philippe
Staddon, Jessica
Technical Publications
December 1st 2009
The frequent data leak reports in the press attest to the difficulty of identifying and protecting sensitive content. Redaction is particularly challenging because it seeks to protect documents by selectively removing sensitive portions, rather than by quarantining or encrypting the whole document. We review current redaction practice and technology and describe a prototype system that supports the natural redaction workflow and addresses some limitations of current technology. In particular, our system supports all phases of the redaction process, through the use of linguistic content analysis, an interactive user interface, and inference detection algorithms.

Citation

Bier, E. A.; Chow, R.; Golle, P.; King, T. H.; Staddon, J. The rules of redaction: identify, protect, review (and repeat). IEEE Security and Privacy Magazine. 2009 December; 7 (6): 46-53.

Additional information

Focus Areas

Our work is centered around a series of Focus Areas that we believe are the future of science and technology.

FIND OUT MORE
Licensing & Commercialization Opportunities

We’re continually developing new technologies, many of which are available for Commercialization.

FIND OUT MORE
News

Our scientists and staffers are active members and contributors to the science and technology communities.

FIND OUT MORE