Ubiquitous Security: Privacy versus Protection.
Timothy BuennemeyerRandolph MarchanyJoseph G. TrontPublished in: PSC (2006)
Keyphrases
- protection mechanisms
- biometric template
- information security
- security issues
- individual privacy
- data protection
- personal data
- privacy protection
- data confidentiality
- security level
- statistical databases
- security concerns
- sensitive data
- data security
- security mechanisms
- privacy issues
- data privacy
- privacy concerns
- protection scheme
- security risks
- personal information
- privacy preserving
- security requirements
- security architecture
- security and privacy issues
- privacy requirements
- security properties
- secure multiparty computation
- identity management
- security measures
- preserving privacy
- biometric data
- critical infrastructure
- privacy preservation
- security threats
- biometric authentication
- data publishing
- access control
- privacy preserving data mining
- sensitive information
- security policies
- information loss
- disclosure risk
- confidential information
- privacy enhancing
- intrusion detection
- security management
- ubiquitous computing
- security services
- rfid systems
- cryptographic protocols
- differential privacy
- computer security
- private information
- data sharing
- data storage
- risk analysis
- biometric systems
- previously mentioned