1. Japan Network Security Association (2008) Information security incident survey report. http://www.jnsa.org/result/incident/data/2008incident_survey_e_v1.0
2. Tabata T, Hakomori S, Ohashi K, Uemura S, Yokoyama K, Taniguchi H (2009) Tracing classified information diffusion for protecting information leakage. IPSJ J 50(9):2088–2102 (in Japanese)
3. Nomura Y, Hakomori S, Ohashi K, Yokoyama K, Taniguchi H (2006) Tracing the diffusion of classified information triggered by file open system call. In: Proceedings of the 4th international conference on computing, communications and control technologies (CCCT 2006), pp 312–317
4. Otsubo N, Uemura S, Yamauchi T, Taniguchi H (2013) Design and evaluation of a diffusion tracing function for classified information among multiple computers. Lecture notes in electrical engineering (LNEE), vol 240, pp 235–242
5. Yumerefendi AR, Mickle B, Cox LP (2007) Tightlip: keeping applications from spilling the beans. In: Proceedings of the 4th USENIX conference on networked systems design and implementation (NSDI ’07), pp 159–172