@inbook{08313177326a4230b51b24c4ce4d63cc,
title = "A Taxonomy of Data Leakage Prevention Solutions",
abstract = "DLP solutions can be characterized according to a taxonomy that incorporates the following attributes: data state, deployment scheme, leakage handling approach, and action taken upon leakage (Figure 3.1).",
keywords = "Deployment Scheme, Leak Incidence, Unauthorized Services, Endpoint Devices, Achieve Access Control",
author = "Asaf Shabtai and Yuval Elovici and Lior Rokach",
note = "Publisher Copyright: {\textcopyright} 2012, The Author(s).",
year = "2012",
month = jan,
day = "1",
doi = "10.1007/978-1-4614-2053-8_3",
language = "English",
isbn = "978-1-4614-2052-1",
series = "SpringerBriefs in Computer Science",
publisher = "Springer",
pages = "11--15",
booktitle = "SpringerBriefs in Computer Science",
address = "Germany",
}