STORK e-privacy and security.
V. KouloliasA. KountzerisHerbert LeitoldBernd ZwattendorferA. CrespoM. SternPublished in: NSS (2011)
Keyphrases
- security issues
- statistical databases
- security concerns
- information security
- data security
- sensitive data
- privacy preserving
- preserving privacy
- privacy issues
- personal data
- security and privacy issues
- privacy concerns
- security mechanisms
- security services
- data privacy
- security risks
- security threats
- electronic payment
- personal information
- privacy requirements
- security requirements
- security measures
- rfid systems
- security properties
- secure multiparty computation
- authentication protocol
- security systems
- confidential information
- privacy enhancing
- individual privacy
- security policies
- policy enforcement
- security problems
- security level
- protection mechanisms
- enterprise network
- intrusion detection
- sensitive information
- private information
- privacy preserving data mining
- access control
- privacy protection
- security protocols
- privacy preservation
- security management
- data confidentiality
- identity management
- user privacy
- biometric template
- data integrity
- rfid technology
- electronic transactions
- data protection
- third party