BYOD: Security and Privacy Considerations.
Keith W. MillerJeffrey M. VoasGeorge F. HurlburtPublished in: IT Prof. (2012)
Keyphrases
- security issues
- statistical databases
- security concerns
- security and privacy issues
- preserving privacy
- security properties
- security mechanisms
- information security
- personal data
- data security
- privacy preserving
- security measures
- secure multiparty computation
- security threats
- security risks
- privacy issues
- confidential information
- individual privacy
- security services
- privacy concerns
- data privacy
- privacy requirements
- protection mechanisms
- electronic payment
- sensitive data
- intrusion detection
- personal information
- security management
- authentication protocol
- cloud computing
- security requirements
- privacy enhancing
- security policies
- network security
- biometric template
- security problems
- identity management
- security analysis
- privacy preserving data mining
- rfid systems
- security systems
- user privacy
- electronic transactions
- policy enforcement
- cryptographic protocols
- privacy preservation
- private information
- access control
- security level
- enterprise network
- encryption key
- privacy protection
- homomorphic encryption
- semi honest
- sensitive information
- information loss
- service providers
- outsourced databases