Novel Authentication & Authorization Management for Sensitive Information Privacy Protection Using Dynamic Key Based Group Key Management.
Xianping WuHuy Hoang NgoPhu Dung LeBalasubramaniam SrinivasanPublished in: Int. J. Comput. Sci. Appl. (2009)
Keyphrases
- privacy protection
- sensitive information
- privacy preserving
- third party
- privacy preservation
- private information
- trusted third party
- original data
- personal data
- management system
- data privacy
- data protection
- private data
- sensitive data
- data collection
- data publishing
- information loss
- access control
- security requirements
- privacy issues
- data sharing
- statistical databases
- data management
- privacy requirements
- privacy policies
- database
- privacy breaches
- security analysis
- data model
- feature selection
- data mining