Login / Signup
Structuring Protocol Implementations to Protect Sensitive Data.
Petr Marchenko
Brad Karp
Published in:
USENIX Security Symposium (2010)
Keyphrases
</>
sensitive data
protection mechanisms
privacy protection
unauthorized access
privacy preserving
user privacy
data storage
information security
data privacy
data protection
data sharing
sensitive information
data confidentiality
smart card
confidential data
privacy preservation
third party
malicious users
security threats
personal data
database management systems
privacy preserving data mining
data sets
data security
encrypted data
databases
database
database design
data integration
access control