Mining Apps for Abnormal Usage of Sensitive Data.
Vitalii AvdiienkoKonstantin KuznetsovAlessandra GorlaAndreas ZellerSteven ArztSiegfried RasthoferEric BoddenPublished in: ICSE (1) (2015)
Keyphrases
- sensitive data
- privacy preservation
- privacy preserving
- data storage
- security concerns
- information security
- smart card
- malicious users
- sensitive information
- confidential data
- data sharing
- third party
- protection mechanisms
- security threats
- data confidentiality
- data privacy
- knowledge discovery
- personal data
- unauthorized access
- data mining
- data sets
- privacy protection
- itemsets
- data collection
- data management
- multi dimensional
- wireless sensor networks
- data analysis
- databases