{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T15:40:41Z","timestamp":1762875641092,"version":"3.40.5"},"reference-count":41,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10,1]]},"abstract":"<p>This article proposes an innovative approach and its implementation as an expert system to achieve the semi-automatic detection of candidate attributes for scrambling sensitive data. Its approach is based on semantic rules that determine which concepts have to be scrambled, and on a linguistic component that retrieves the attributes that semantically correspond to these concepts. Because attributes cannot be considered independently from each other, it also addresses the challenging problem of the propagation of the scrambling process through the entire database. One main contribution of this article's approach is to provide a semi-automatic process for the detection of sensitive data. The underlying knowledge is made available through production rules operationalizing the detection of the sensitive data. A validation of its approach using four different databases is provided.<\/p>","DOI":"10.4018\/irmj.2014100102","type":"journal-article","created":{"date-parts":[[2014,11,20]],"date-time":"2014-11-20T13:35:34Z","timestamp":1416490534000},"page":"23-44","source":"Crossref","is-referenced-by-count":2,"title":["A Semantic Approach for Semi-Automatic Detection of Sensitive Data"],"prefix":"10.4018","volume":"27","author":[{"given":"Jacky","family":"Akoka","sequence":"first","affiliation":[{"name":"CEDRIC-CNAM & Institut Mines-Telecom TEM, Paris, France"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Isabelle","family":"Comyn-Wattiau","sequence":"additional","affiliation":[{"name":"CEDRIC-CNAM & ESSEC Business School, Paris, France"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"C\u00e9dric","family":"Du Mouza","sequence":"additional","affiliation":[{"name":"CEDRIC-CNAM, Paris, France"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hammou","family":"Fadili","sequence":"additional","affiliation":[{"name":"Maison des Sciences de l'Homme, Paris, France"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nadira","family":"Lammari","sequence":"additional","affiliation":[{"name":"CEDRIC-CNAM, Paris, France"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Elisabeth","family":"Metais","sequence":"additional","affiliation":[{"name":"CEDRIC-CNAM, Paris, France"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Samira Si-Said","family":"Cherfi","sequence":"additional","affiliation":[{"name":"CEDRIC-CNAM, Paris, France"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"2432","reference":[{"key":"irmj.2014100102-0","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2006.08.007"},{"key":"irmj.2014100102-1","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133637"},{"key":"irmj.2014100102-2","first-page":"45","article-title":"Disclosure Limitation of Sensitive Rules.","author":"M.Atallah","year":"1999","journal-title":"Proc.Intl. Workshop on Knowledge and Data Engineering Exchange (KDEX)"},{"key":"irmj.2014100102-3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.97"},{"key":"irmj.2014100102-4","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.1988.11943"},{"key":"irmj.2014100102-5","doi-asserted-by":"crossref","unstructured":"Bonchi, F., Gionis, A., & Tassa, T. (2011). Identity Obfuscation in Graphs Through the Information Theoretic Lens. In Proc. Intl. Conf. on Data Engineering (ICDE) (p. 924-935). Camouflage. (n.d.). (http:\/\/www.datamasking.com)","DOI":"10.1109\/ICDE.2011.5767905"},{"key":"irmj.2014100102-6","first-page":"843","article-title":"Efficient Techniques for Document Sanitization.","author":"V. T.Chakaravarthy","year":"2008","journal-title":"Proc. Intl. Conf. on Information and Knowledge Management (CIKM)"},{"key":"irmj.2014100102-7","unstructured":"Chen, B.-C., LeFevre, K., & Ramakrishnan, R. (2007). Privacy Skyline: Privacy with Multidimensional Adversarial Knowledge. In Proc. intl. conf. on very large data bases (vldb) (pp. 770\u2013781)."},{"key":"irmj.2014100102-8","unstructured":"Datamasker. (n.d.). (http:\/\/www.datamasker.com)"},{"key":"irmj.2014100102-9","unstructured":"Datavantage Globa. (n.d.). (http:\/\/www.datavantage.com)"},{"key":"irmj.2014100102-10","first-page":"247","article-title":"A Semantic Approach to Improve Automatically Data Security During Test of Information Systems.","author":"C.du Mouza","year":"2010","journal-title":"Proc. Intl. Conf. on Advances in Databases, Knowledge, and Data Applications (DBKDA)"},{"key":"irmj.2014100102-11","doi-asserted-by":"publisher","DOI":"10.1145\/1749603.1749605"},{"key":"irmj.2014100102-12","doi-asserted-by":"publisher","DOI":"10.1109\/CBMS.2008.129"},{"key":"irmj.2014100102-13","unstructured":"(n.d.). HCM Data Scrambler."},{"key":"irmj.2014100102-14","unstructured":"JESS. the Rule Engine for the Java Platform.(n.d.). (http:\/\/www.jessrules.com)"},{"key":"irmj.2014100102-15"},{"key":"irmj.2014100102-16","doi-asserted-by":"crossref","unstructured":"Leacock, C., & Chodorow, M. (1998). Combining Local Context and WordNet Similarity for Word Sense Identification. MIT Press, 265-283.","DOI":"10.7551\/mitpress\/7287.003.0018"},{"key":"irmj.2014100102-17","first-page":"106","article-title":"t-Closeness: Privacy Beyond k-Anonymity and l-Diversity.","author":"N.Li","year":"2007","journal-title":"Proc. Intl. Conf. on Data Engineering (ICDE)"},{"key":"irmj.2014100102-18","first-page":"296","article-title":"An Information-Theoretic Definition of Similarity.","author":"D.Lin","year":"1998","journal-title":"Proc. Intl. Conf. on Machine Learning (ICML)"},{"key":"irmj.2014100102-19","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09695-7_33"},{"key":"irmj.2014100102-20","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"irmj.2014100102-21","unstructured":"Meyerson, A., & Williams, R. (2004). On theHCM Data Scramble Tool. (n.d.). (http:\/\/mudiaminc.com\/Hcm-Data-scrambel-tool.html)"},{"key":"irmj.2014100102-22","doi-asserted-by":"crossref","unstructured":"Morin, E., & Jacquemin, C. (2004). Automatic Acquisition and Expansion of Hypernym Links. Computer and the Humanities, 38(4).","DOI":"10.1007\/s10579-004-1926-2"},{"issue":"32","key":"irmj.2014100102-23","article-title":"Automated DeIdentification of Free-Text Medical Records.","volume":"8","author":"I.Neamatullah","year":"2008","journal-title":"BMC Medical Informatics and Decision Making"},{"key":"irmj.2014100102-24","unstructured":"Noo, J. a free linguistic development environment. (n.d.). (http:\/\/www.nooj4nlp.net)"},{"key":"irmj.2014100102-25","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2003.1250990"},{"key":"irmj.2014100102-26","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247490"},{"key":"irmj.2014100102-27","doi-asserted-by":"publisher","DOI":"10.3115\/1614025.1614037"},{"key":"irmj.2014100102-28","unstructured":"Pse Data Security. (n.d.). (http:\/\/www.psedatasecurity.com)"},{"key":"irmj.2014100102-29","unstructured":"Ravikumar, G. K., Manjunath, T. N., Ravindra, S. H., & Umesh, I. M. (2011). A survey on recent trends, process and development in data masking for testing. International Journal of Computer Science, (8), 2."},{"key":"irmj.2014100102-30","first-page":"448","article-title":"Using Information Content to Evaluate Semantic Similarity in a Taxonomy.","author":"P.Resnik","year":"1995","journal-title":"Proc. Intl. Conf. on Artificial Intelligence (IJCAI)"},{"key":"irmj.2014100102-31","first-page":"1","article-title":"Anonymous Surveillance.","author":"M. K.Saini","year":"2011","journal-title":"Proc. Intl. Conf. on Multimedia and Expo (ICME)"},{"key":"irmj.2014100102-32","first-page":"99","article-title":"Supporting Pattern-Preserving Anonymization For Time-Series Data.","author":"L.Shou","year":"2011","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"irmj.2014100102-33","unstructured":"Solix. (n.d.). (http:\/\/www.solix.com)"},{"key":"irmj.2014100102-34","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"irmj.2014100102-35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20039-7_11"},{"key":"irmj.2014100102-36","first-page":"1","article-title":"OST-Tree: An Access Method for Obfuscating Spatio-Temporal Data in Location Based Services.","author":"Q. C.To","year":"2011","journal-title":"Proc. Intl. Conf. New Technologies, Mobility and Security (NTMS)"},{"key":"irmj.2014100102-37","first-page":"163","article-title":"Evaluation of Data Anonymization Tools.","author":"S.Vinogradov","year":"2012","journal-title":"Proc. Intl. Conf. on Advances in Databases, Knowledge, and Data Applications (DBKDA)"},{"key":"irmj.2014100102-38","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2007.12.005"},{"key":"irmj.2014100102-39","unstructured":"WordNet: An Electronic Lexical Database. (n.d.). (http:\/\/wordnet.princeton.edu)"},{"key":"irmj.2014100102-40","doi-asserted-by":"crossref","unstructured":"Wu, Z., & Palmer, M. S. (1994). Verb Semantics and Lexical Selection. In Proc. of the Association for Computational Linguistics (ACL) (p. 133-138).","DOI":"10.3115\/981732.981751"}],"container-title":["Information Resources Management Journal"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=119483","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T19:53:05Z","timestamp":1747165985000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/irmj.2014100102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2014,10,1]]},"references-count":41,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,10]]}},"URL":"https:\/\/doi.org\/10.4018\/irmj.2014100102","relation":{},"ISSN":["1040-1628","1533-7979"],"issn-type":[{"type":"print","value":"1040-1628"},{"type":"electronic","value":"1533-7979"}],"subject":[],"published":{"date-parts":[[2014,10,1]]}}}