Aligning Security and Privacy to Support the Development of Secure Information Systems.
Haralambos MouratidisChristos KalloniatisShareeful IslamMarc-Philippe HugetStefanos GritzalisPublished in: J. Univers. Comput. Sci. (2012)
Keyphrases
- security issues
- information systems
- information security
- support systems
- security properties
- sensitive data
- security measures
- security mechanisms
- data security
- security requirements
- secure multiparty computation
- security concerns
- security services
- security threats
- authentication protocol
- statistical databases
- privacy preserving
- security level
- group communication
- knowledge management
- security management
- identity management
- electronic payment
- security protocols
- cryptographic protocols
- intrusion detection
- rfid systems
- security risks
- diffie hellman
- cloud computing
- smart card
- security policies
- personal information
- homomorphic encryption
- key management
- information leakage
- access control
- security and privacy issues
- data privacy
- privacy concerns
- user privacy
- privacy preserving data mining
- key distribution
- development process
- security analysis
- enterprise wide
- privacy protection
- key agreement protocol
- user authentication
- mutual authentication
- protection mechanisms
- semi honest
- personal data