128-135. doi: 10.1109/IA.2009.4927510 ©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit...
© 2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish th...
In the virtual and widely distributed network, the process of handover sensitive data from the distr...
As we know now a days we have to share our image with many other companies to get the service from t...
©1993 IEEE. Personal use of this material is permitted. However, permission to reprint/republish thi...
Abstract- A data distributor has given sensitive data to a set of supposedly trusted agents. Sometim...
©2012 IEEE. Personal use of this material is permitted. However, permission to reprint/republish thi...
© 1986 IEEE. Personal use of this material is permitted. However, permission to reprint/republish th...
Nowadays the software is becoming complex as clients expect a number of functionalities in software....
Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses...
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright...
Leaking of confidential data to an unauthorized agent is a major concern for an organization. In thi...
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unau...
© 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
Personal use of this material is permitted. However, permission to reprint/republish this material f...
Accidental or intentional distribution of data to unauthorized entity is the data leakage.In busines...
© 2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish th...
In the virtual and widely distributed network, the process of handover sensitive data from the distr...
As we know now a days we have to share our image with many other companies to get the service from t...
©1993 IEEE. Personal use of this material is permitted. However, permission to reprint/republish thi...
Abstract- A data distributor has given sensitive data to a set of supposedly trusted agents. Sometim...
©2012 IEEE. Personal use of this material is permitted. However, permission to reprint/republish thi...
© 1986 IEEE. Personal use of this material is permitted. However, permission to reprint/republish th...
Nowadays the software is becoming complex as clients expect a number of functionalities in software....
Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses...
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright...
Leaking of confidential data to an unauthorized agent is a major concern for an organization. In thi...
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unau...
© 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
Personal use of this material is permitted. However, permission to reprint/republish this material f...
Accidental or intentional distribution of data to unauthorized entity is the data leakage.In busines...
© 2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish th...
In the virtual and widely distributed network, the process of handover sensitive data from the distr...
As we know now a days we have to share our image with many other companies to get the service from t...