WITDOM: Empowering Privacy and Security in Non-trusted Environments.
Juan Ramón Troncoso-PastorizaElsa Prieto PérezPublished in: ERCIM News (2016)
Keyphrases
- security issues
- outsourced databases
- security concerns
- statistical databases
- network connection
- trusted computing
- security properties
- preserving privacy
- personal data
- information security
- security threats
- security mechanisms
- data security
- privacy concerns
- trust relationships
- identity management
- sensitive data
- data privacy
- security and privacy issues
- electronic payment
- privacy enhancing
- privacy requirements
- privacy preserving
- personal information
- privacy issues
- security requirements
- security risks
- protection mechanisms
- secure multiparty computation
- security measures
- third party
- network security
- confidential information
- biometric template
- security problems
- rfid systems
- user privacy
- authentication protocol
- security management
- intrusion detection
- cloud computing
- computing environments
- homomorphic encryption
- individual privacy
- private information
- computer security
- sensitive information
- privacy preserving data mining
- key management
- security analysis
- security protocols
- privacy protection
- privacy preservation
- data integrity
- data protection