Modelling corporate wireless security and privacy.
Vasilios KatosCarl AdamsPublished in: J. Strateg. Inf. Syst. (2005)
Keyphrases
- security issues
- security concerns
- statistical databases
- preserving privacy
- security mechanisms
- privacy requirements
- data security
- personal data
- security and privacy issues
- rfid systems
- security threats
- information security
- sensitive data
- privacy issues
- privacy preserving
- confidential information
- privacy concerns
- security risks
- data privacy
- security measures
- authentication protocol
- secure multiparty computation
- security policies
- security requirements
- security properties
- biometric template
- privacy enhancing
- security problems
- wireless communication
- privacy preservation
- protection mechanisms
- wireless networks
- identity management
- security services
- access control
- intrusion detection
- mobile devices
- electronic payment
- personal information
- private information
- wireless local area network
- homomorphic encryption
- case study
- individual privacy
- privacy protection
- physical layer
- knowledge management
- mutual authentication
- network security
- security management
- cyber security
- differential privacy
- resource constrained