Chapter Eight - Privacy Requirements in Cybersecurity Applications of Blockchain.
Louise AxonMichael GoldsmithSadie CreesePublished in: Adv. Comput. (2018)
Keyphrases
- privacy requirements
- privacy preserving
- data security
- privacy preservation
- private information
- privacy protection
- case study
- privacy preserving data mining
- access control
- data publishing
- privacy policies
- database design
- personal information
- e government
- decision trees
- privacy concerns
- data centric
- object oriented
- data integrity
- data model