Assessing Software Privacy using the Privacy Flow-Graph.
Feiyang TangBjarte M. ØstvoldPublished in: CoRR (2022)
Keyphrases
- privacy preserving
- personal information
- privacy preservation
- flow graph
- private information
- security issues
- flow graphs
- security risks
- privacy aware
- private data
- differential privacy
- privacy preserving data mining
- privacy concerns
- location privacy
- privacy protection
- statistical databases
- software systems
- software engineering
- data mining
- personal data
- sensitive information
- privacy issues
- computer systems
- identity management
- software development
- source code
- legal issues
- information systems