Take Your Security and Privacy Into Your Own Hands! Why Security and Privacy Assistants Should be Tangible.
Sarah Delgado RodriguezSarah PrangeFlorian AltPublished in: MuC (Workshopband) (2021)
Keyphrases
- security issues
- security concerns
- statistical databases
- security properties
- preserving privacy
- personal data
- security threats
- privacy preserving
- sensitive data
- data security
- security and privacy issues
- security risks
- security services
- security requirements
- information security
- privacy requirements
- security mechanisms
- secure multiparty computation
- data privacy
- biometric template
- personal information
- privacy issues
- individual privacy
- protection mechanisms
- rfid systems
- access control
- privacy concerns
- security measures
- security policies
- authentication protocol
- confidential information
- identity management
- cyber security
- privacy enhancing
- security problems
- electronic payment
- security analysis
- private information
- security protocols
- privacy preserving data mining
- policy enforcement
- sensitive information
- privacy protection
- privacy preservation
- mutual authentication
- network security
- intrusion detection
- cryptographic protocols
- user privacy
- data storage
- information leakage
- security management
- smart card
- biometric data
- web applications
- outsourced databases