Can We Make a Cake and Eat it Too? A Discussion of ICN Security and Privacy.
Edith C. H. NgaiBörje OhlmanGene TsudikErsin UzunMatthias WählischChristopher A. WoodPublished in: Comput. Commun. Rev. (2017)
Keyphrases
- security issues
- statistical databases
- security concerns
- security and privacy issues
- personal data
- security properties
- security mechanisms
- information security
- sensitive data
- data security
- privacy issues
- privacy preserving
- privacy concerns
- preserving privacy
- secure multiparty computation
- biometric template
- data privacy
- rfid systems
- security measures
- security requirements
- confidential information
- security risks
- security services
- security threats
- protection mechanisms
- privacy requirements
- access control
- electronic payment
- individual privacy
- intrusion detection
- personal information
- security problems
- identity management
- privacy preserving data mining
- electronic commerce
- security policies
- private information
- privacy preservation
- security management
- security protocols
- privacy enhancing
- authentication protocol
- privacy protection
- network security
- homomorphic encryption
- electronic transactions
- information leakage
- encryption key
- cyber security
- policy enforcement
- data confidentiality
- user privacy
- data publishing
- security level
- data integrity
- security analysis
- encryption scheme
- smart card