Skip to main content

Masking Gateway for Enterprises

  • Chapter
Languages: From Formal to Natural

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 5533))

  • 445 Accesses

Abstract

Today’s business world revolves around the need to share data. On the other hand, the leakage of sensitive data is becoming one of our main security threats. Organizations are becoming more aware of the need to control the information that flows out of their boundaries and must more strictly monitor this flow in order to comply with government regulations. This paper presents an SOA-based solution called Masking Gateway for Enterprises (MAGEN), which allows the sharing of data while safeguarding sensitive business data. The major novelty lies in architecting a single system that handles a wide range of scenarios in a centralized and unified manner.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Burke, B.E.: Information Protection and Control Survey: Data Loss Prevention and Encryption Trends. IDC Special Study, Doc. # 211109 (2008)

    Google Scholar 

  2. Proctor, P.E., Mogull, R., Ouellet, E.: Magic Quadrant for Content Monitoring and Filtering and Data Loss Prevention. Gartner report, ID Number: G00147610 (2007)

    Google Scholar 

  3. Yuhanna, N.: Protecting Private Data with Data Masking. Forrester report (2006), http://www.forrester.com/Research/Document/Excerpt/0,7211,39116,00.html

  4. Feiman, J.: Data Obfuscation (Masking, Privacy, Scrambling): Many Names for the Same Technique. Gartner report, ID Number: G00157661 (2008)

    Google Scholar 

  5. IBM Optim., http://www.optimsolution.com/

  6. Oracle, http://www.oracle.com/enterprise_manager/data-masking.html

  7. Camouflage, http://www.datamasking.com/camouflage.html

  8. Nelken, H., Vortman, P., Cohen, S., Melament, A.: De-Identification Framework. IBM White Paper (2004)

    Google Scholar 

  9. Gardner, J.L.: HIDE: An Integrated System for Health Information DE-identification. In: 21st IEEE International Symposium on Computer-Based Medical Systems, CBMS 2008, pp. 254–259. IEEE Press, Los Alamitos (2008)

    Chapter  Google Scholar 

  10. Carter, G.: LDAP System Administration. O’ Reilly, Sebastopol (2003)

    Google Scholar 

  11. IBM RACF, http://www-03.ibm.com/servers/eserver/zseries/zos/racf/

  12. CA ACF2, http://www.ca.com/us/products/product.aspx?id=111

  13. IBM EAS, http://www-01.ibm.com/software/data/ips/products/masterdata/eas/

  14. MitemView, http://www.mitem.com/products/mitemview.asp

  15. Agrawal, R., Srikant, R.: Privacy Preserving Data Mining. ACM’s Special Interest Group on Management Of Data (SIGMOD) 29(2), 439–450 (2000)

    Google Scholar 

  16. Sweeney, L.: k-anonymity: A Model for Protecting Privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), 557–570 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  17. Bayardo, R.J., Agrawal, R.: Data Privacy through Optimal k-anonymization. In: Proceedings of the 21st IEEE International Conference on Data Engineering. ICDE 2005, pp. 217–228 (2005)

    Google Scholar 

  18. Shand, B., Rashbass, J.: Protecting privacy in tabular healthcare data: explicit uncertainty for disclosure control. In: Proceedings of the 2005 ACM workshop on Privacy in the Electronic Society (WPES 2005), pp. 20–26 (2005)

    Google Scholar 

  19. Goshtasby, A., Ehrich, R.W.: Contextual word recognition using probabilistic relaxation labeling. Pattern Recognition 21(5), 455–462 (1988)

    Article  Google Scholar 

  20. Porat, S., Carmeli, B., Domany, T., Drory, T., Geva, A., Tarem, A.: Dynamic Masking of Application Displays Using OCR Technologies. IBM Systems Journal, special issue on Global Service Delivery Technologies (2008) (submitted)

    Google Scholar 

  21. IBM DataStage, http://www-01.ibm.com/software/data/infosphere/datastage/

  22. Cranor, L.F.: Web Privacy with P3P. O’Reilly, Sebastopol (2002)

    Google Scholar 

  23. OASIS eXtensible Access Control Markup Language (XACML), http://lists.oasis-open.org/archives/wsia/200205/pdf00001.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Porat, S. et al. (2009). Masking Gateway for Enterprises. In: Grumberg, O., Kaminski, M., Katz, S., Wintner, S. (eds) Languages: From Formal to Natural. Lecture Notes in Computer Science, vol 5533. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01748-3_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-01748-3_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-01747-6

  • Online ISBN: 978-3-642-01748-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics