{"id":"https://openalex.org/W2762186203","doi":"https://doi.org/10.1109/mcom.2017.1700235","title":"Data Leakage Prevention for Secure Cross-Domain Information Exchange","display_name":"Data Leakage Prevention for Secure Cross-Domain Information Exchange","publication_year":2017,"publication_date":"2017-10-01","ids":{"openalex":"https://openalex.org/W2762186203","doi":"https://doi.org/10.1109/mcom.2017.1700235","mag":"2762186203"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/mcom.2017.1700235","pdf_url":null,"source":{"id":"https://openalex.org/S158797327","display_name":"IEEE Communications Magazine","issn_l":"0163-6804","issn":["0163-6804","1558-1896"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://www.duo.uio.no/bitstream/10852/59338/4/output%20%281%29.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081709051","display_name":"Kyrre Wahl Kongsg\u00e5rd","orcid":null},"institutions":[{"id":"https://openalex.org/I163244428","display_name":"Norwegian Defence Research Establishment","ror":"https://ror.org/0098gnz32","country_code":"NO","type":"facility","lineage":["https://openalex.org/I163244428"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Kyrre Wahl Kongsgard","raw_affiliation_strings":["Norwegian Defence Research Establishment"],"affiliations":[{"raw_affiliation_string":"Norwegian Defence Research Establishment","institution_ids":["https://openalex.org/I163244428"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081978421","display_name":"Nils Agne Nordbotten","orcid":null},"institutions":[{"id":"https://openalex.org/I163244428","display_name":"Norwegian Defence Research Establishment","ror":"https://ror.org/0098gnz32","country_code":"NO","type":"facility","lineage":["https://openalex.org/I163244428"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Nils Agne Nordbotten","raw_affiliation_strings":["Norwegian Defence Research Establishment"],"affiliations":[{"raw_affiliation_string":"Norwegian Defence Research Establishment","institution_ids":["https://openalex.org/I163244428"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036741322","display_name":"Federico Mancini","orcid":null},"institutions":[{"id":"https://openalex.org/I163244428","display_name":"Norwegian Defence Research Establishment","ror":"https://ror.org/0098gnz32","country_code":"NO","type":"facility","lineage":["https://openalex.org/I163244428"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Federico Mancini","raw_affiliation_strings":["Norwegian Defence Research Establishment"],"affiliations":[{"raw_affiliation_string":"Norwegian Defence Research Establishment","institution_ids":["https://openalex.org/I163244428"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070891324","display_name":"Raymond Haakseth","orcid":null},"institutions":[{"id":"https://openalex.org/I163244428","display_name":"Norwegian Defence Research Establishment","ror":"https://ror.org/0098gnz32","country_code":"NO","type":"facility","lineage":["https://openalex.org/I163244428"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Raymond Haakseth","raw_affiliation_strings":["Norwegian Defence Research Establishment"],"affiliations":[{"raw_affiliation_string":"Norwegian Defence Research Establishment","institution_ids":["https://openalex.org/I163244428"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090446312","display_name":"Paal Engelstad","orcid":"https://orcid.org/0009-0000-8371-927X"},"institutions":[{"id":"https://openalex.org/I163244428","display_name":"Norwegian Defence Research Establishment","ror":"https://ror.org/0098gnz32","country_code":"NO","type":"facility","lineage":["https://openalex.org/I163244428"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Paal E. Engelstad","raw_affiliation_strings":["Norwegian Defence Research Establishment"],"affiliations":[{"raw_affiliation_string":"Norwegian Defence Research Establishment","institution_ids":["https://openalex.org/I163244428"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.75,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":9,"citation_normalized_percentile":{"value":0.842432,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":84,"max":85},"biblio":{"volume":"55","issue":"10","first_page":"37","last_page":"43"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9986,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/guard","display_name":"Guard (computer science)","score":0.6363895},{"id":"https://openalex.org/keywords/information-assurance","display_name":"Information assurance","score":0.4199311}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9238605},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.79066783},{"id":"https://openalex.org/C141141315","wikidata":"https://www.wikidata.org/wiki/Q2379942","display_name":"Guard (computer science)","level":2,"score":0.6363895},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5519643},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.48523116},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.4313692},{"id":"https://openalex.org/C2780795517","wikidata":"https://www.wikidata.org/wiki/Q6030997","display_name":"Information assurance","level":3,"score":0.4199311},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.37307674},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.30212402},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.116380304},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/mcom.2017.1700235","pdf_url":null,"source":{"id":"https://openalex.org/S158797327","display_name":"IEEE Communications Magazine","issn_l":"0163-6804","issn":["0163-6804","1558-1896"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://hdl.handle.net/10852/59338","pdf_url":"https://www.duo.uio.no/bitstream/10852/59338/4/output%20%281%29.pdf","source":{"id":"https://openalex.org/S4306401716","display_name":"Duo Research Archive (University of Oslo)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I184942183","host_organization_name":"University of Oslo","host_organization_lineage":["https://openalex.org/I184942183"],"host_organization_lineage_names":["University of Oslo"],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://hdl.handle.net/10852/59338","pdf_url":"https://www.duo.uio.no/bitstream/10852/59338/4/output%20%281%29.pdf","source":{"id":"https://openalex.org/S4306401716","display_name":"Duo Research Archive (University of Oslo)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I184942183","host_organization_name":"University of Oslo","host_organization_lineage":["https://openalex.org/I184942183"],"host_organization_lineage_names":["University of Oslo"],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.42}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":12,"referenced_works":["https://openalex.org/W2101234009","https://openalex.org/W2121727866","https://openalex.org/W2125908420","https://openalex.org/W2210209119","https://openalex.org/W2408141691","https://openalex.org/W2430040201","https://openalex.org/W2552203406","https://openalex.org/W2574640638","https://openalex.org/W2594701447","https://openalex.org/W2602277547","https://openalex.org/W270760228","https://openalex.org/W4213009331"],"related_works":["https://openalex.org/W4241003180","https://openalex.org/W4232461742","https://openalex.org/W2991148700","https://openalex.org/W2488601579","https://openalex.org/W2482091526","https://openalex.org/W2391901998","https://openalex.org/W2351247954","https://openalex.org/W2066272013","https://openalex.org/W1761928473","https://openalex.org/W1573839549"],"abstract_inverted_index":{"Cross-domain":[0],"information":[1,209],"exchange":[2],"is":[3,24,96,99,226],"an":[4,69],"increasingly":[5],"important":[6],"capability":[7],"for":[8,202],"conducting":[9],"efficient":[10],"and":[11,17,39,183,211,234],"secure":[12],"operations,":[13],"both":[14],"within":[15,18],"coalitions":[16],"single":[19],"nations.":[20],"A":[21],"data":[22,37],"guard":[23,57],"a":[25,83,90,125,199,229],"common":[26],"cross-domain":[27,138],"sharing":[28],"solution":[29,95],"that":[30,41,45,56,67,97,167],"inspects":[31],"the":[32,75,78,93,104,107,133,148,170,207,213],"security":[33,79,108,135],"labels":[34,80],"of":[35,72,77,92,106,116,127,136,150,154,222,232],"exported":[36],"objects":[38],"validates":[40],"they":[42,46],"are":[43,190],"such":[44,119,137],"can":[47,59,163],"be":[48,60,179],"released":[49],"according":[50],"to":[51,192,197,216],"policy.":[52],"While":[53],"we":[54,65,140,162,205],"see":[55],"solutions":[58],"implemented":[61],"with":[62,173],"high":[63],"assurance,":[64],"find":[66],"obtaining":[68],"equivalent":[70],"level":[71],"assurance":[73,102],"in":[74,86,103],"correctness":[76,105],"easily":[81],"becomes":[82],"hard":[84],"problem":[85],"practical":[87],"scenarios.":[88],"Thus,":[89],"weakness":[91],"guard-based":[94],"there":[98],"often":[100],"limited":[101],"labels.":[109],"To":[110,131],"mitigate":[111],"this,":[112],"guards":[113],"make":[114],"use":[115,149,212],"content":[117,144],"checkers":[118,145],"as":[120,124,187],"dirty":[121,159],"word":[122,160],"lists":[123],"means":[126],"detecting":[128],"mislabeled":[129],"data.":[130],"improve":[132],"overall":[134],"solutions,":[139],"investigate":[141],"more":[142],"advanced":[143],"based":[146],"on":[147,156],"machine":[151],"learning.":[152],"Instead":[153],"relying":[155],"manually":[157],"specified":[158],"lists,":[161],"build":[164],"data-driven":[165],"methods":[166,186],"automatically":[168],"infer":[169],"words":[171],"associated":[172],"classified":[174,233],"content.":[175],"However,":[176],"care":[177],"must":[178],"taken":[180],"when":[181],"constructing":[182],"deploying":[184],"these":[185],"naive":[188],"implementations":[189],"vulnerable":[191],"manipulation":[193],"attacks.":[194],"In":[195],"order":[196],"provide":[198],"better":[200],"context":[201],"performing":[203],"classification,":[204],"monitor":[206],"incoming":[208],"flow":[210],"audit":[214],"trail":[215],"construct":[217],"controlled":[218],"environments.":[219],"The":[220],"usefulness":[221],"this":[223],"deployment":[224],"scheme":[225],"demonstrated":[227],"using":[228],"real":[230],"collection":[231],"unclassified":[235],"documents.":[236]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2762186203","counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2}],"updated_date":"2025-04-24T16:03:02.156615","created_date":"2017-10-20"}