An investigation into unintentional information leakage through electronic publication
- Forrester, Jock, Irwin, Barry V W
- Authors: Forrester, Jock , Irwin, Barry V W
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428814 , vital:72538 , https://digifors.cs.up.ac.za/issa/2005/Proceedings/Poster/012_Article.pdf
- Description: Organisations are publishing electronic documents on their websites, via email to clients and potentially un-trusted third parties. This trend can be attributed to the ease of use of desktop publishing/editing soft-ware as well as the increasingly connected environment that employ-ees work in. Advanced document editors have features that enable the use of group editing, version control and multi-user authoring. Unfortu-nately these advanced features also have their disadvantages. Metadata used to enable the collaborative features can unintentionally expose confidential data to unauthorised users once the document has been published.
- Full Text:
- Authors: Forrester, Jock , Irwin, Barry V W
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428814 , vital:72538 , https://digifors.cs.up.ac.za/issa/2005/Proceedings/Poster/012_Article.pdf
- Description: Organisations are publishing electronic documents on their websites, via email to clients and potentially un-trusted third parties. This trend can be attributed to the ease of use of desktop publishing/editing soft-ware as well as the increasingly connected environment that employ-ees work in. Advanced document editors have features that enable the use of group editing, version control and multi-user authoring. Unfortu-nately these advanced features also have their disadvantages. Metadata used to enable the collaborative features can unintentionally expose confidential data to unauthorised users once the document has been published.
- Full Text:
Towards an Infrastructural Framework for Secure Electronic Publication
- Forrester, Jock, Irwin, Barry V W
- Authors: Forrester, Jock , Irwin, Barry V W
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428274 , vital:72499 , https://d1wqtxts1xzle7.cloudfront.net/3456213/No_147_-_Forrester-libre.pdf?1390832679=andresponse-content-disposi-tion=inline%3B+filename%3DTowards_an_Infrastructural_Framework_for.pdfandExpires=1714791785andSignature=TY2i5fIQcyv493crTdmDaMEDLBmnqe-s1yjeJ4OAk~-Syb12yZ1EBj-cJi8jxrmIorji6THEB4kSon43fOBcA5XUwoZ0H1T~LooHIyiqhBymL2ZtszKbFdqu1zZCrCkfR1YYAjUiVaM2BNSyC-P-mtY6S5aFcwztHl43eogmS70AIt0x76p9gIvL3xQsyE-VXBrtOrbkbQweUmgZs80bQDMnS-oou481C0BJyp8y6St6BETLKCaJC~uPYzrHOG1CwVxNZQoz38zJ3pLIzuNmdLcrlts3BbASji3c53MY-CoEGflXljrvzG6f85EBo-Oy9kjyAzvJ9gZmfISayfA-~w__andKey-Pair-Id=APKAJLOHF5GGSLRBV4ZA
- Description: To prevent the accidental, or deliberate, publication of documents contain-ing hidden information the organisation needs to have an Electronic Publi-cation Policy, more importantly though, it needs to have the Technical Infra-structure in place to enforce the policy. This paper outlines such a Technical Infrastructure.
- Full Text:
- Authors: Forrester, Jock , Irwin, Barry V W
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428274 , vital:72499 , https://d1wqtxts1xzle7.cloudfront.net/3456213/No_147_-_Forrester-libre.pdf?1390832679=andresponse-content-disposi-tion=inline%3B+filename%3DTowards_an_Infrastructural_Framework_for.pdfandExpires=1714791785andSignature=TY2i5fIQcyv493crTdmDaMEDLBmnqe-s1yjeJ4OAk~-Syb12yZ1EBj-cJi8jxrmIorji6THEB4kSon43fOBcA5XUwoZ0H1T~LooHIyiqhBymL2ZtszKbFdqu1zZCrCkfR1YYAjUiVaM2BNSyC-P-mtY6S5aFcwztHl43eogmS70AIt0x76p9gIvL3xQsyE-VXBrtOrbkbQweUmgZs80bQDMnS-oou481C0BJyp8y6St6BETLKCaJC~uPYzrHOG1CwVxNZQoz38zJ3pLIzuNmdLcrlts3BbASji3c53MY-CoEGflXljrvzG6f85EBo-Oy9kjyAzvJ9gZmfISayfA-~w__andKey-Pair-Id=APKAJLOHF5GGSLRBV4ZA
- Description: To prevent the accidental, or deliberate, publication of documents contain-ing hidden information the organisation needs to have an Electronic Publi-cation Policy, more importantly though, it needs to have the Technical Infra-structure in place to enforce the policy. This paper outlines such a Technical Infrastructure.
- Full Text:
- «
- ‹
- 1
- ›
- »