Gathering and Analyzing Identity Leaks for Security Awareness.
David JaegerHendrik GraupnerAndrey SapeginFeng ChengChristoph MeinelPublished in: PASSWORDS (2014)
Keyphrases
- information flow
- identity management
- information security
- intrusion detection
- computer security
- automatic identification
- security systems
- information assurance
- security policies
- situation awareness
- biometric data
- security mechanisms
- security requirements
- security issues
- statistical databases
- data sets
- access control
- security level
- security analysis
- security model
- security problems
- security threats
- network management
- risk assessment
- security management
- individual privacy
- cloud computing
- leak detection