Login / Signup
Locking the virtual filing cabinet: A researcher's guide to Internet data security.
Jonathan E. Westfall
Cindy M. Kim
Annie Y. Ma
Published in:
Int. J. Inf. Manag. (2012)
Keyphrases
</>
data security
access control
data centric
data management
data integrity
data privacy
privacy preserving data mining
case study
concurrency control
distributed databases
third party
database systems
information security
data storage
database
business processes
data mining