Scheme overcoming incompatibility of privacy and utilization of personal data.
Shigeo TsujiiKohtaro TadakiRyou FujitaHiroshi YamaguchiMasahito GotaishiYukiyasu TsunooTakahiko SyoujiNorihisa DoiPublished in: ISITA (2012)
Keyphrases
- personal data
- personal information
- privacy protection
- privacy preserving
- service providers
- protection mechanisms
- privacy concerns
- data privacy
- data collection
- identity theft
- third party
- data protection
- private data
- sensitive data
- sensitive information
- privacy policies
- web content
- social networking
- sensor networks
- knowledge discovery
- privacy preservation
- query processing