Privacy and Security [Guest editors' introduction].
Sunny ConsolvoJason I. HongMarc LangheinrichPublished in: IEEE Pervasive Comput. (2015)
Keyphrases
- security issues
- security concerns
- statistical databases
- information security
- data security
- privacy issues
- personal data
- preserving privacy
- security properties
- security and privacy issues
- security mechanisms
- security requirements
- privacy preserving
- privacy requirements
- secure multiparty computation
- data privacy
- security threats
- privacy concerns
- confidential information
- security measures
- rfid systems
- electronic payment
- sensitive data
- protection mechanisms
- personal information
- biometric template
- individual privacy
- security risks
- identity management
- access control
- authentication protocol
- homomorphic encryption
- virtual machine
- network security
- security services
- security management
- outsourced databases
- data publishing
- privacy enhancing
- privacy preserving data mining
- privacy protection
- sensitive information
- intrusion detection
- special issue
- data sharing
- mutual authentication
- trusted third party
- cloud computing
- information systems
- data confidentiality
- information leakage
- data protection
- security policies
- user privacy
- privacy preservation
- cyber security
- cryptographic protocols
- security problems