Protecting Personal Information with Secure Execution Technology.
Ren BauerHye-Chung KumMichael C. ReiterPublished in: AMIA (2013)
Keyphrases
- personal information
- identity management
- personal data
- protection mechanisms
- privacy issues
- privacy aware
- information leakage
- social networking
- private information
- individual privacy
- third party
- access control
- preserving privacy
- privacy concerns
- data protection
- search tools
- data encryption
- user centric
- sensitive data
- social network services
- private data
- data collection
- identity theft