Setting a Privacy and Security Comfort Zone in the Internet of Things.
Barbara Endicott-PopovskyScott L. DavidMartha E. CrosbyPublished in: HCI (15) (2015)
Keyphrases
- security issues
- statistical databases
- security concerns
- data security
- personal data
- security measures
- security mechanisms
- privacy preserving
- security risks
- security and privacy issues
- sensitive data
- information security
- preserving privacy
- privacy requirements
- data privacy
- security properties
- privacy issues
- secure multiparty computation
- rfid systems
- privacy concerns
- protection mechanisms
- security policies
- access control
- personal information
- electronic payment
- biometric template
- security services
- authentication protocol
- security problems
- security threats
- identity management
- privacy enhancing
- individual privacy
- policy enforcement
- confidential information
- intrusion detection
- privacy preserving data mining
- security requirements
- private information
- electronic transactions
- cryptographic protocols
- data protection
- homomorphic encryption
- differential privacy
- privacy preservation
- user privacy
- privacy protection
- rfid technology
- electronic commerce
- third party
- network security
- sensitive information
- security protocols
- key technologies
- ubiquitous computing
- trusted third party
- biometric systems
- key management
- service providers
- cyber security
- data mining