Comprehensive path-sensitive data-flow analysis.
Aditya V. ThakurR. GovindarajanPublished in: CGO (2008)
Keyphrases
- data mining
- flow analysis
- sensitive data
- information security
- information flow
- privacy preserving
- data storage
- smart card
- data sharing
- third party
- security concerns
- sensitive information
- intrusion detection
- malicious users
- confidential data
- privacy protection
- data confidentiality
- information systems
- association rules
- protection mechanisms
- personal data
- anomaly detection
- database management systems
- peer to peer
- databases
- database