Privacy and/or Security: Take Your Pick.
George F. HurlburtKeith W. MillerJeffrey M. VoasJamison M. DayPublished in: IT Prof. (2009)
Keyphrases
- security issues
- statistical databases
- security concerns
- personal data
- security properties
- security risks
- security mechanisms
- security measures
- preserving privacy
- data security
- sensitive data
- rfid systems
- privacy preserving
- secure multiparty computation
- privacy issues
- personal information
- confidential information
- security and privacy issues
- data privacy
- security threats
- information security
- protection mechanisms
- authentication protocol
- privacy concerns
- privacy requirements
- security problems
- security services
- privacy enhancing
- network security
- security policies
- access control
- individual privacy
- identity management
- electronic payment
- security protocols
- enterprise network
- biometric template
- cloud computing
- homomorphic encryption
- security requirements
- private information
- security management
- information systems
- smart card
- cyber security
- sensitive information
- intrusion detection
- mutual authentication
- encryption scheme
- encryption key
- data confidentiality
- intrusion detection system
- privacy preserving data mining
- trust relationships
- privacy protection