Modelling Alter-egos in Cyberspace Using a Work Flow Management Tool: Who Takes Care of Security and Privacy?
Reind P. van de RietHans F. M. BurgPublished in: WebNet (1997)
Keyphrases
- security issues
- security concerns
- statistical databases
- personal data
- information security
- preserving privacy
- sensitive data
- privacy preserving
- personal information
- security and privacy issues
- security mechanisms
- security measures
- identity management
- data privacy
- security risks
- privacy issues
- privacy requirements
- security properties
- rfid systems
- security services
- secure multiparty computation
- security threats
- data security
- confidential information
- privacy concerns
- security policies
- privacy enhancing
- electronic payment
- security requirements
- security problems
- biometric template
- access control
- information flow
- private information
- protection mechanisms
- individual privacy
- outsourced databases
- intrusion detection
- security management
- authentication protocol
- privacy preservation
- long term
- network security
- security analysis
- mutual authentication
- encryption key
- flow field
- data mining
- policy enforcement
- homomorphic encryption
- smart card
- privacy protection
- privacy preserving data mining
- cryptographic protocols