What Engineers Should Know about US Security and Privacy Law.
Travis D. BreauxDavid G. GordonPublished in: IEEE Secur. Priv. (2013)
Keyphrases
- security issues
- statistical databases
- security concerns
- security mechanisms
- security and privacy issues
- preserving privacy
- security properties
- sensitive data
- data security
- data privacy
- personal data
- information security
- confidential information
- security threats
- privacy preserving
- security requirements
- privacy issues
- secure multiparty computation
- security risks
- security measures
- protection mechanisms
- security problems
- security services
- privacy requirements
- access control
- privacy concerns
- computational intelligence
- electronic payment
- identity management
- privacy enhancing
- biometric template
- personal information
- rfid systems
- security policies
- privacy preservation
- individual privacy
- intrusion detection
- encryption key
- data confidentiality
- mutual authentication
- computer scientists
- security management
- cloud computing
- information loss
- privacy protection
- network security
- smart card
- enterprise network
- authentication protocol
- cyber security
- key management
- policy enforcement
- information leakage
- service providers
- trusted third party
- electronic commerce
- user privacy
- sensitive information
- privacy preserving data mining
- legal reasoning
- data integrity
- encryption scheme