Login / Signup

An operating system security method for integrity and privacy protection in consumer electronics.

Jinhong K. GuoStephen JohnsonIl-Pyung Park
Published in: CCNC (2006)
Keyphrases
  • operating system
  • privacy protection
  • databases
  • case study
  • information loss
  • data mining
  • data structure
  • access control
  • security requirements
  • data security