Growing connected networks under privacy constraint: Achieving trade-off between performance and security.
Azwirman GusrialdiZhihua QuPublished in: CDC (2015)
Keyphrases
- trade off
- security issues
- statistical databases
- security concerns
- security properties
- security mechanisms
- enterprise network
- personal data
- information security
- data security
- security and privacy issues
- security threats
- rfid systems
- privacy requirements
- security risks
- sensitive data
- preserving privacy
- electronic payment
- privacy issues
- confidential information
- social networks
- data privacy
- network security
- secure multiparty computation
- privacy enhancing
- protection mechanisms
- biometric template
- personal information
- security requirements
- identity management
- privacy preserving
- security measures
- individual privacy
- outsourced databases
- authentication protocol
- network structure
- security services
- access control
- data protection
- security protocols
- information loss
- private information
- intrusion detection
- rfid tags
- cryptographic protocols