6G White paper: Research challenges for Trust, Security and Privacy.
Mika YlianttilaRaimo KantolaAndrei V. GurtovLorenzo MucchiIan OppermannZheng YanTri Hong NguyenFei LiuTharaka Mawanane HewaMadhusanka LiyanageIjaz AhmadJuha PartalaRobert AbbasArtur HeckerSara JayousiAlessio MartinelliStefano CaputoJonathan BechtoldIvan MoralesRazvan-Andrei StoicaGiuseppe AbreuShahriar ShahabuddinErdal PanayirciHarald HaasTanesh KumarBasak Ozan OzparlakJuha RöningPublished in: CoRR (2020)
Keyphrases
- security concerns
- security issues
- security and privacy issues
- privacy concerns
- security services
- privacy issues
- security problems
- security threats
- policy enforcement
- personal information
- data security
- information security
- statistical databases
- trust relationships
- security requirements
- privacy preserving
- access control
- security policies
- electronic transactions
- preserving privacy
- access control models
- security mechanisms
- sensitive data
- personal data
- privacy requirements
- security management
- trust model
- electronic commerce
- private information
- identity management
- electronic payment
- data privacy
- rfid systems
- trusted computing
- authentication protocol
- individual privacy
- legal issues
- security measures
- enterprise network
- security properties
- trust management
- cloud computing
- public key infrastructure
- security risks
- privacy preserving data mining
- network security
- security protocols
- intrusion detection
- trust negotiation
- confidential information
- cryptographic protocols
- social networks