Background Use of Sensitive Information to Aid in Analysis of Non-sensitive Data on Threats and Vulnerabilities.
Richard A. SmithPublished in: ISI (2005)
Keyphrases
- sensitive information
- sensitive data
- information security
- privacy preserving
- third party
- privacy preservation
- security threats
- malicious users
- smart card
- privacy issues
- data storage
- intrusion detection
- data privacy
- privacy preserving data mining
- privacy protection
- data sharing
- data analysis
- information systems
- private information
- data sets
- original data
- personal data
- data management
- training data