Structuring Protocol Implementations to Protect Sensitive Data.
Petr MarchenkoBrad KarpPublished in: USENIX Security Symposium (2010)
Keyphrases
- sensitive data
- protection mechanisms
- privacy protection
- unauthorized access
- privacy preserving
- user privacy
- data storage
- information security
- data privacy
- data protection
- data sharing
- sensitive information
- data confidentiality
- smart card
- confidential data
- privacy preservation
- third party
- malicious users
- security threats
- personal data
- database management systems
- privacy preserving data mining
- data sets
- data security
- encrypted data
- databases
- database
- database design
- data integration
- access control