Constraint graphs as security filters for privacy assurance in medical transactions.
George MathewZoran ObradovicPublished in: BCB (2011)
Keyphrases
- security issues
- information security
- electronic transactions
- security concerns
- statistical databases
- sensitive data
- security and privacy issues
- electronic commerce
- privacy concerns
- data security
- security risks
- security requirements
- privacy issues
- security threats
- security properties
- privacy preserving
- security services
- preserving privacy
- rfid systems
- data privacy
- personal data
- privacy policies
- security policies
- intrusion detection
- access control
- privacy requirements
- biometric template
- security mechanisms
- health information
- electronic payment
- secure multiparty computation
- database
- confidential information
- privacy enhancing
- protection mechanisms
- individual privacy
- security measures
- smart card
- identity management
- personal information
- concurrency control
- privacy preserving data mining
- graph mining
- medical data
- network security
- privacy protection
- data protection
- transaction management
- authentication protocol
- key management
- sensitive information
- cyber security
- security management
- homomorphic encryption