Login / Signup

A User Controlled Approach for Securing Sensitive Information in Directory Services.

William R. ClaycombDongwan Shin
Published in: J. Univers. Comput. Sci. (2009)
Keyphrases
  • sensitive information
  • third party
  • privacy preserving
  • malicious users
  • private information
  • original data
  • privacy preservation
  • sensitive data
  • data sets
  • end users
  • support vector machine
  • nearest neighbor
  • smart card