WWW.BOOK.DISLIB.INFO
FREE ELECTRONIC LIBRARY - Books, dissertations, abstract
 
<< HOME
CONTACTS



Pages:   || 2 |

«1 Introduction The censor package allows a convenient redaction/censor capability to be employed, for those who need to protect restricted ...»

-- [ Page 1 ] --

The censor Package

Tools for Producing Redacted Documents

Steven B. Segletes

steven.b.segletes.civ@mail.mil

July 30, 2013

v3.21

1 Introduction

The censor package allows a convenient redaction/censor capability to be employed, for those who need to protect restricted information, as well as for those

who are forced to work in a more inefficient environment when dealing with

restricted information.

Let us assume you have a document for internal use, containing some restricted (i.e., private, sensitive, proprietary or classified) information. To give a very

short (fictitious) example:

RESTRICTED SOURCE:

The Liberty missile, with charge diameter (CD) of 80~mm, revealed a penetration capability of 1.30 1.19, and 1.37~CD in three recent tests into armor steel.

RESTRICTED OUTPUT:

The Liberty missile, with charge diameter (CD) of 80 mm, revealed a penetration capability of 1.30 1.19, and 1.37 CD in three recent tests into armor steel.

Censor/redaction capabilities are desirable to sanitize the information. This would accomplish two things: allow for wider distribution of the output and/or allow a less sensitive output to be stored locally with fewer storage controls.

There are two modes in which the censor package can be used: (i) when the source (.tex file) remains restricted/secure; and (ii) when the source (.tex file) is public/unsecure.

2 Mode I: Restricted/Secure Source (.tex file) In this mode, you create the source in a restricted/secure environment, but would like to produce output that can be more widely distributed, or stored in a less restricted location. With the addition of \usepackage{censor} to your document preamble, the \censor command becomes accessible to block out key

identifiers:

CENSORED RESTRICTED SOURCE:

The \censor{Liberty} missile, with charge diameter (CD) of \censor{80}~mm, revealed a penetration capability of 1.30 1.19, and 1.37~CD in three recent tests into armor steel.

CENSORED NO-LONGER-RESTRICTED OUTPUT:

The missile, with charge diameter (CD) of mm, revealed a penetration capability of 1.30 1.19, and 1.37 CD in three recent tests into armor steel.

The censored version of the output is (presumably) less sensitive in its content, and my be stored in or distributed to a less sensitive environment (e.g., as a hardcopy). The censored words are not part of the output document (hardcopy or electronic), even though the space allocated for the redaction is identical to the original word being redacted.

The document may also be printed out in its restricted (uncensored) form, merely with the addition of the \StopCensoring command at the beginning of

the document:

UNCENSORED RESTRICTED SOURCE:

\StopCensoring The \censor{Liberty} missile, with charge diameter (CD) of \censor{80}~mm, revealed a penetration capability of 1.30, 1.19, and 1.37~CD in three recent tests into armor steel.

UNCENSORED RESTRICTED OUTPUT:

The Liberty missile, with charge diameter (CD) of 80 mm, revealed a penetration capability of 1.30, 1.19, and 1.37 CD in three recent tests into armor steel.

As of version 3.0, the ability to censor “boxed” objects like images and/or tabular environments is made possible with the \censorbox command. As an

example, one could use the following source:

UNCENSORED RESTRICTED SOURCE:

The \censor{Liberty} missile, with charge diameter (CD) of \censor{80}~mm, revealed a penetration capability into armor steel, as detailed in Table 1.

–  –  –

in order to turn, what would otherwise be the following restricted output into a censored, unrestricted table.

UNCENSORED RESTRICTED OUTPUT:

The Liberty missile, with charge diameter (CD) of 80 mm, revealed a penetration capability into armor steel, as detailed in Table 1.

–  –  –

Additionally, as of version 2.0, there is provided a block-censor capability, for redacting larger blocks of text. This new command is \blackout, and is used in the form \blackout{Block of text}. This nice thing about this command is that it can stretch across line and paragraph boundaries conveniently.

For example,

UNCENSORED RESTRICTED SOURCE:

\blackout{ The Liberty missile, with charge diameter (CD) of 80~mm, revealed a penetration capability of 1.30, 1.19, and 1.37~CD in three recent tests into armor steel.}

–  –  –

CENSORED UNRESTRICTED OUTPUT:

...

.

.

There is a caveat regarding the use of \blackout. The argument cannot end on so-called “glue,” such as a space or a carriage return. The following examples

are, thus, bad forms of the \blackout command:

\blackout{Ends in space. Bad form } \blackout{Ends in carriage return. Bad form } Secondly, periods are not censored (as of version 2.1). This is done because it is necessary to preserve the period-space combination that signifies end-ofsentence. In this way, L TEX can preserve inter-word spacing in the redacted A version that is identical to the unredacted version.





Thirdly, \blackout does not work across environment boundaries, such as math or tabular mode. You can blackout text in the table, cell by cell; But you cannot blackout the whole tabular environment with the \blackout command (instead, you should use the \censorbox command for tabular environments).

Finally, the argument to \blackout can employ tokens; However, the tokens are expanded into one large blackout, regardless of whether the expanded token contains spaces. Thus \blackout{\today} becomes, in spite of the fact that \today, given at the moment by July 30, 2013, contains spaces.

The author received some negative feedback concerning the appearance resulting from a \blackout command. Generally, people did not like the fact that spaces were not blacked out, whether it was a concern over security or merely cosmetic.

To this end, the \xblackout command is introduced in V3.10, which blacks out the text more completely, while simultaneously preserving the layout indentical to that of the uncensored document.

The additional blacking-out of the \xblackout macro is controlled by five resettable lengths which lap additional blacking atop the result of \blackout. By

default, these lengths are defined as:

\periodrlap = 1.6ex \afterperiodlap = 1.2ex \lletterlap = 0.55ex \rletterlap = 0.55ex \afterspacelap = 0.0ex The length \periodrlap is the length of right-lapped blackout applied just before printing a period. Thus, this blacking is intended to cover the period not treated by \blackout. The length \afterperiodlap is a left-lapped blackout applied just prior to word following a period. Its intent is to back-cover the extra-wide spacing that follows a period. The length \lletterlap is the leftlapped blacking applied before a character. It will help cover inter-word space if \afterspacelap is not employed. The length \rletterlap is the rightlapped blacking applied after a character, which as with \lletterlap, can help cover inter-word spacing if \afterspacelap is not employed. Finally, there is \afterspacelap which, if employed, is a left-lapped blacking applied before the character that follows a space.

The blacking from \xblackout is intended to be less “choppy” than that of \blackout. However, it too has some drawbacks. The x-blacking will extend past the left and right margins. If a line of output ends on a period (as we show in our example below), that line and the beginning of the next line may have their blacked-out margins not in uniformity with other lines, based on the settings of the various lapping lengths employed. If \periodrlap is too large, it could blackout subsequent text in an unintended way. With all these caveats, it may still be found preferable to \blackout, as shown in the example below.

UNCENSORED RESTRICTED SOURCE:

{% The Liberty missile, with charge diameter (CD) of 80~mm, revealed a penetration capability of 1.30, 1.19, and 1.37~CD in recent testing here. The tests were into armor steel.} New paragraph} with open text.

UNCENSORED RESTRICTED OUTPUT:

The Liberty missile, with charge diameter (CD) of 80 mm, revealed a penetration capability of 1.30, 1.19, and 1.37 CD in recent testing here.

The tests were into armor steel.

New paragraph with open text.

CENSORED UNRESTRICTED OUTPUT (\blackout{}):

....

.

–  –  –

CENSORED UNRESTRICTED OUTPUT (\xblackout{}):

....

.

–  –  –

3 Mode II: Public/Unsecure Source (.tex file) This mode is envisioned for users who must bear a large level of inconvenience to work in a restricted/secure environment (generally meaning in a location physically removed from one’s desk). Its use is envisioned to allow a large percentage of a document to be created in an public/unsecure environment, with only the restricted details being completed in a restricted/secure environment.

After including the \usepackage{censor} command in the document preamble, the \censor* and \censorbox* commands becomes accessible. The way this

author envisions its use is as follows:

CENSORED UNRESTRICTED SOURCE:

% KEYWORD IDENTIFIERS:

\def\Missile{\censor*{7}} \def\Size{\censor*{2}} \def\TableOne{\censorbox*[\small]{26}{5}{3.5}} The {\Missile} missile, with charge diameter (CD) of {\Size}~mm, revealed a penetration capability ranging from 1.19--1.37~CD in three recent tests into armor steel, as detailed in Table 1.

\begin{table}[ht] \begin{center} \textbf{Table 1. {\Missile} Missile Test Data}\\ {\TableOne} \end{center} \end{table}

CENSORED UNRESTRICTED OUTPUT:

The missile, with charge diameter (CD) of mm, revealed a penetration capability ranging from 1.19–1.37 CD in three recent tests into armor steel, as detailed in Table 1.

–  –  –

In this way, the source (.tex file) contains no restricted information, and may thus be prepared in an unrestricted environment. The argument to the \censor* command is a number representing the approximate width of the redaction (in ex’s). In the case of the \censorbox* command, it has three mandatory arguments and one optional argument (note that the unstarred form of the \censorbox command has not three, but one, mandatory arguments). The mandatory arguments to \censorbox* are box width (in ex’s), box height (in multiples of \baselineskip) and finally the depth below the baseline where the bottom of the box should be (in multiples of \baselineskip). The optional argument can include commands that you want in force for the \censorbox command, most typically fontsize commands, which will affect the size of the an ex and \baselineskip.

Because the redaction width is only approximate, it is possible that the censored and uncensored originals might have differing text justification. In the text, the curly braces are placed around the keyword identifiers so as to produce the proper interaction with the surrounding whitespace and punctuation.

Because the source (.tex) file contains no restricted information, the use of \StopCensoring cannot (in and of itself) produce the restricted document.

Rather it will produce the following:

UNCENSORED UNRESTRICTED OUTPUT:

The missile, with charge diameter (CD) of mm, revealed a penetration capability ranging from 1.19–1.37 CD in three recent tests into armor steel, as detailed in Table 1.

–  –  –



Pages:   || 2 |


Similar works:

«Int. J. Learning Technology, Vol. 4, Nos. 3/4, 2009 129 Affect-aware tutors: recognising and responding to student affect Beverly Woolf* Department of Computer Science University of Massachusetts Amherst, USA E-mail: bev@cs.umass.edu *Corresponding author Winslow Burleson School of Computer Science and Informatics/Arts, Media and Engineering Arizona State University, USA E-mail: winslow.burleson@asu.edu Ivon Arroyo, Toby Dragon and David Cooper Department of Computer Science University of...»

«Organisationales Lernen – Selbstorganisierte Wissenslogistik in einer Krankenversicherungsgesellschaft Markus Won, Volkmar Pipek ProSEC, Institut für Informatik III, Universität Bonn, {won|pipek}@cs.uni-bonn.de Markus Rohde Agenda Consult GmbH, Bonn, markus.rohde@agenda-consult.de Prof. Dr. Peter Mambrey Fraunhofer – Institut für Angewandte Informationstechnik FIT, Sankt Augustin, mambrey@fit.fraunhofer.de Organisationales Lernen – Selbstorganisierte Wissenslogistik in einer...»

«EMGund videogestützte Analyse ausgewählter Fit-Karten Schriftliche Hausarbeit (mit Anhang) im Rahmen der Ersten Staatsprüfung für das Lehramt für die Primarstufe dem Staatlichen Prüfungsamt Dortmund vorgelegt von Kozak, Sonja Dortmund, im Dezember 2002 Themensteller : Univ.-Prof. Dr. Stephan Starischka Fachbereich : FB 16-Sport Inhaltsverzeichnis 0 Einleitung 8 0.1 Herleitung 8 0.2 Ziel der Arbeit 9 0.3 Struktur der Arbeit 10 1 Fit-Karten 13 1.1 Hintergrund 13 1.2 Inhalte und Ziele des...»

«CHAPTER 14 GUIDE FOR CONSTRUCTING SELF-EFFICACY SCALES Albert Bandura A. BANDURA Perceived self-efficacy is concerned with people’s beliefs in their capabilities to produce given attainments (Bandura, 1997). One cannot be all things, which would require mastery of every realm of human life. People differ in the areas in which they cultivate their efficacy and in the levels to which they develop it even within their given pursuits. For example, a business executive may have a high sense of...»

«Acreditació d'equips d‘atenció primària a Catalunya Manual d‘estàndards Acreditació d’equips d’atenció primària a Catalunya Manual d’estàndards 1 de 322 Acreditació d'equips d‘atenció primària a Catalunya Manual d‘estàndards Sumari Criteri 1. Lideratge Subcriteri 1.a) L‘equip directiu de l‘EAP desenvolupa la missió, la visió i els valors, que actuen com a models de referència dins de la cultura de l‘excel·lència Agrupador conceptual 01. Missió de l‘EAP...»

«Signifikante Signaturen XIV Mit ihrer Katalogedition »Signifikante Signaturen« stellt die Ostdeutsche Sparkassenstiftung in Zusammenarbeit mit ausgewiesenen Kennern der zeitgenössischen Kunst besonders förderungswürdige Künstlerinnen und Künstler aus Brandenburg, Mecklenburg-Vorpommern, Sachsen und Sachsen-Anhalt vor. In the “Significant Signatures” catalogue edition, the Ostdeutsche Sparkassenstiftung, East German Savings Banks Foundation, in collaboration with renowned experts in...»

«Human Systems: The Journal of Systemic Consultation & Management Articulating CMM as a practical theory J. Kevin Barge Dept. of Speech Communication, University of Georgia ABSTRACT This essay evaluates how practitioners have used CMM as a practical theory. Based on how practitioners have used CMM, I highlight three challenges for future work in practical theorizing: (1) developing the reflexive relationship between CMM as a practical theory and grammars of practice, (2) articulating the...»

«SAMOS/NGI Data Management System Project Defense Jacob T. Rettig Florida State University Fall 2009 A project submitted to the Department of Computer Science In partial fulfillment of the requirements for the Degree of Master of Science Major Professor: Dr. Daniel G. Schwartz1 Committee: Dr. Mark A. Bourassa2, 3, Dr. FeiFei Li1, and Shawn R. Smith2 1 Computer Science, 2 COAPS, 3 Meteorology SAMOS/NGI DMS Jacob T. Rettig Table of Contents No Title Page Acknowledgments 3 Abstract 4 1....»

«AMENDMENT FORM Suggestion for amendment of Article : 224a By Ms Maria Berger, Mr Caspar Einem, Mr Hannes Farnleitner, Mr Gerhard Tusek Status : Members and Alternate Members [Article 224a A panel shall be set up in order to give an opinion on candidates' suitability to perform the duties of Judge and Advocate-General of the Court of Justice and the High Court before the governments of the Member States take the decisions referred to in Articles 223 and 224. The panel shall comprise seven...»

«HP Data Protector StoreOnce Software Deduplication Introducing the StoreOnce library White Paper Table of contents Summary Overview When to use a B2D device About StoreOnce software deduplication Advantages of B2D devices and deduplication Deduplication performance How target-side deduplication integrates with Data Protector Backup To Disk device concepts B2D device operation Device locking Object consolidation Backing up data using B2D devices Gateways StoreOnce library (deduplication store)...»





 
<<  HOME   |    CONTACTS
2016 www.book.dislib.info - Free e-library - Books, dissertations, abstract

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.