Workshop: NORC and Secure Data Service: Unlocking Access to Sensitive Data.
Richard WelptonJohannes Fernandes-HuessyDaniel GwynnePublished in: IASSIST Conference (2012)
Keyphrases
- sensitive data
- sensitive information
- data storage
- unauthorized access
- privacy preserving
- confidential data
- database
- data privacy
- data sharing
- data analysis
- data collection
- original data
- anomaly detection
- service providers
- data management
- third party
- smart card
- information security
- data protection
- data quality
- data sets
- information systems
- personal data
- high dimensional
- privacy protection
- data sources
- data points
- knowledge discovery
- data mining techniques
- high dimensional data
- input data