FogProtect: Protecting Sensitive Data in the Computing Continuum.
Dhouha AyedEva JahoClemens LachnerZoltán Ádám MannRobert SeidlMike SurridgePublished in: ESOCC Workshops (2020)
Keyphrases
- sensitive data
- protection mechanisms
- privacy preservation
- privacy preserving
- unauthorized access
- third party
- security concerns
- data storage
- smart card
- data sharing
- information security
- sensitive information
- malicious users
- data protection
- security threats
- confidential data
- data confidentiality
- privacy protection
- data privacy
- data mining
- data sets
- access control
- digital libraries