A Comparison of Two Architectures for Implementing Security and Privacy in Cyberspace.
Reind P. van de RietWouter JanssenMartin S. OlivierRadu SerbanPublished in: DEXA (2000)
Keyphrases
- security issues
- statistical databases
- security concerns
- privacy preserving
- security mechanisms
- privacy requirements
- personal data
- data security
- information security
- preserving privacy
- security properties
- secure multiparty computation
- security and privacy issues
- security threats
- privacy issues
- security risks
- rfid systems
- security measures
- security services
- security problems
- confidential information
- intrusion detection
- privacy concerns
- security systems
- protection mechanisms
- electronic payment
- sensitive data
- security requirements
- privacy protection
- access control
- personal information
- information loss
- privacy preservation
- privacy preserving data mining
- authentication protocol
- sensitive information
- security management
- data confidentiality
- data privacy
- biometric template
- differential privacy
- privacy enhancing
- security protocols
- outsourced databases