Research Article
A Data Leakage Prevention Method Based on the Reduction of Confidential and Context Terms for Smart Mobile Devices
Input: - Confidential documents set | - Non-confidential documents set | - Clusters set, each with the centroid and corresponding graph | - The set of context terms | Output: - The updated set of confidential terms in clusters | - The updated set of context terms | (1) | (2) for (each in ) | (3) If | (4) | (5) for (each in ) | (6) Update confidential terms in CT | (7) Update context terms in |
|