An Access Control Scheme for Protecting Personal Data.
Wilfred VillegasBader AliMuthucumaru MaheswaranPublished in: PST (2008)
Keyphrases
- control scheme
- personal data
- data protection
- protection mechanisms
- personal information
- closed loop
- access control
- dynamic model
- privacy protection
- control law
- control system
- control strategy
- service providers
- predictive control
- robot manipulators
- privacy preserving
- sensitive data
- data collection
- third party
- control loop
- data privacy
- fuzzy controller
- pid controller
- databases
- sensitive information
- privacy preservation
- data sets
- privacy concerns
- website
- database
- social networking
- information security
- mathematical model
- real time