Detecting privacy leaks in the RATP App: how we proceeded and what we found.
Jagdish Prasad AcharaJames-Douglass LefruitVincent RocaClaude CastellucciaPublished in: J. Comput. Virol. Hacking Tech. (2014)
Keyphrases
- private information
- personal information
- sensitive information
- automatic identification
- privacy preserving
- social networking
- privacy issues
- information flow
- privacy preserving data mining
- third party
- personal data
- identity management
- privacy preservation
- security risks
- fully functional
- security concerns
- individual privacy
- leak detection
- privacy concerns
- privacy aware
- database
- privacy protection
- automatic detection
- information systems
- data sets