{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:48:48Z","timestamp":1750308528673,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905358","type":"proceedings-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T12:40:09Z","timestamp":1472215209000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Data Vault"],"prefix":"10.1145","author":[{"given":"Ashka","family":"Shastri","sequence":"first","affiliation":[{"name":"Raksha Shakti University, Ahmedabad, India"}]},{"given":"Priyanka","family":"Sharma","sequence":"additional","affiliation":[{"name":"Raksha Shakti University, Ahmedabad, India"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"volume-title":"IEEE","year":"2014","author":"Tahboub Radwan","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.464"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Saurabh Verma and Abhishek Singh Data theft prevention & endpoint protection from Unauthorized USB devices IEEE Fourth International Conference on Advanced Computing ICoAC 2012.  Saurabh Verma and Abhishek Singh Data theft prevention & endpoint protection from Unauthorized USB devices IEEE Fourth International Conference on Advanced Computing ICoAC 2012.","DOI":"10.1109\/ICoAC.2012.6416856"},{"volume-title":"IEEE","year":"2015","author":"Hauer Barbara","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Simon Liu Rick Kuhn Data Loss Prevention IEEE USA 2010.  Simon Liu Rick Kuhn Data Loss Prevention IEEE USA 2010.","DOI":"10.1109\/MITP.2010.52"},{"key":"e_1_3_2_1_6_1","unstructured":"Data Security: Top Threats To Data Protection DOI= http:\/\/ptac.ed.gov\/sites\/default\/files\/issue-brief-threats-to-your-data.pdf  Data Security: Top Threats To Data Protection DOI= http:\/\/ptac.ed.gov\/sites\/default\/files\/issue-brief-threats-to-your-data.pdf"},{"key":"e_1_3_2_1_7_1","unstructured":"Data Leakage - Threats and Mitigation DOI= https:\/\/www.sans.org\/readingroom\/whitepapers\/awareness\/data-leakage-threats-mitigation-1931  Data Leakage - Threats and Mitigation DOI= https:\/\/www.sans.org\/readingroom\/whitepapers\/awareness\/data-leakage-threats-mitigation-1931"},{"volume":"201","journal-title":"Journal","author":"Raman Preeti","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","unstructured":"ISACA \"Data Leak Prevention\" viable DOI= http:\/\/www.isaca.org\/KnowledgeCenter\/Research\/ResearhDeliverables\/Pages\/Data-Leak-Prevention.aspx  ISACA \"Data Leak Prevention\" viable DOI= http:\/\/www.isaca.org\/KnowledgeCenter\/Research\/ResearhDeliverables\/Pages\/Data-Leak-Prevention.aspx"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"D. H. Kang B. H. Jung K. Y. Kim Hardware Based Data Inspection for USB Data Leakage Prevention Security Technology pp. 57--63 2009.  D. H. Kang B. H. Jung K. Y. Kim Hardware Based Data Inspection for USB Data Leakage Prevention Security Technology pp. 57--63 2009.","DOI":"10.1007\/978-3-642-10847-1_8"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/PDP.2011.44"}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","acronym":"ICTCS '16","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905358","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905358","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:55:49Z","timestamp":1750272949000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905358"}},"subtitle":["A Security Model for Preventing Data Theft in Corporate"],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":11,"alternative-id":["10.1145\/2905055.2905358","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905358","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}