Protected data paths: delivering sensitive data via untrusted proxies.
Jiantao KongKarsten SchwanPatrick M. WidenerPublished in: PST (2006)
Keyphrases
- sensitive data
- privacy preserving
- sensitive information
- confidential data
- data privacy
- data sharing
- data storage
- database
- smart card
- third party
- input data
- data collection
- unauthorized access
- information security
- knowledge discovery
- privacy protection
- raw data
- personal data
- malicious users
- data protection
- feature space