Automated Identification of Sensitive Data via Flexible User Requirements.
Ziqi YangZhenkai LiangPublished in: SecureComm (1) (2018)
Keyphrases
- user requirements
- sensitive data
- privacy preserving
- data storage
- information security
- confidential data
- smart card
- end users
- security concerns
- data confidentiality
- data sharing
- sensitive information
- privacy protection
- malicious users
- third party
- data privacy
- personal data
- privacy preservation
- unauthorized access
- database
- security threats
- database management systems
- data sets
- data security
- peer to peer