Research Article
A Data Leakage Prevention Method Based on the Reduction of Confidential and Context Terms for Smart Mobile Devices
| Input: - Confidential documents set | | - Non-confidential documents set | | - Clusters set, each with the centroid and corresponding graph | | - The set of context terms | | Output: - The updated set of confidential terms in clusters | | - The updated set of context terms | | (1) | | (2) for (each in ) | | (3) If | | (4) | | (5) for (each in ) | | (6) Update confidential terms in CT | | (7) Update context terms in |
|