The Design of Access Control by using Data Dependency To Reduce the Inference of Sensitive Data.
Kuei-Sheng LeeYen-Cheng LaiShao-Yu ChenYi-Shin LinMeng-Feng TsaiPublished in: TAAI (2020)
Keyphrases
- access control
- sensitive data
- unauthorized access
- data protection
- sensitive information
- data sets
- original data
- database
- personal data
- privacy preserving
- confidential data
- data quality
- data collection
- raw data
- security policies
- identity management
- database security
- data integrity
- access control policies
- databases
- data analysis
- feature space
- data security
- data sources
- data mining techniques
- security requirements
- distributed data
- input data
- data sharing
- data objects