Keyphrases
- policy enforcement
- security issues
- access control
- security concerns
- statistical databases
- security management
- data security
- personal data
- security threats
- security mechanisms
- enterprise network
- information security
- security properties
- privacy requirements
- preserving privacy
- privacy concerns
- privacy policies
- privacy preserving
- security and privacy issues
- sensitive data
- data privacy
- security requirements
- security risks
- security measures
- rfid systems
- secure multiparty computation
- security policies
- privacy enhancing
- security services
- protection mechanisms
- identity management
- individual privacy
- security problems
- privacy issues
- confidential information
- intrusion detection
- authentication protocol
- personal information
- trust negotiation
- privacy protection
- access control policies
- role based access control
- network security
- private information
- rfid tags
- privacy preserving data mining
- key management
- trusted third party
- security analysis
- information leakage
- mutual authentication
- differential privacy
- security protocols
- reinforcement learning
- data publishing
- cryptographic protocols
- smart card
- cloud computing
- outsourced databases