Protecting privacy with protocol stack virtualization.
Janne LindqvistJuha-Matti TapioPublished in: WPES (2008)
Keyphrases
- protocol stack
- privacy issues
- privacy preservation
- protection mechanisms
- privacy preserving
- embedded systems
- wireless communication
- personal information
- disclosure control
- data protection
- communication protocols
- cloud computing
- operating system
- tcp ip
- quality of service
- virtual machine
- privacy preserving data mining
- data privacy
- personal data
- sensitive data
- privacy concerns
- sensitive information
- data center
- access control
- low cost
- information systems
- open source
- case study