Security & Privacy Week Interviews, Part 2.
Ahmad-Reza SadeghiGhada DessoukyPublished in: IEEE Secur. Priv. (2016)
Keyphrases
- security issues
- security concerns
- statistical databases
- personal data
- security mechanisms
- privacy preserving
- security properties
- information security
- security and privacy issues
- privacy concerns
- data security
- preserving privacy
- sensitive data
- confidential information
- security risks
- security measures
- personal information
- protection mechanisms
- security requirements
- privacy requirements
- security problems
- privacy issues
- data privacy
- security threats
- electronic payment
- identity management
- secure multiparty computation
- rfid systems
- privacy enhancing
- biometric template
- security policies
- security services
- access control
- authentication protocol
- privacy preserving data mining
- sensitive information
- security analysis
- case study
- individual privacy
- data confidentiality
- outsourced databases
- security systems
- privacy protection
- grounded theory
- intrusion detection
- network security
- semi honest
- private information
- user privacy
- rfid tags
- policy enforcement
- electronic commerce
- data sharing
- enterprise network
- mutual authentication
- key management
- privacy preservation
- digital rights management
- differential privacy
- security protocols
- rfid technology