Ask the Experts: What Should Be on an IoT Privacy and Security Label?
Pardis Emami NaeiniYuvraj AgarwalLorrie Faith CranorHanan HibshiPublished in: IEEE Symposium on Security and Privacy (2020)
Keyphrases
- security issues
- rfid systems
- security problems
- statistical databases
- security concerns
- data security
- preserving privacy
- cloud computing
- personal data
- security mechanisms
- information security
- privacy requirements
- data privacy
- privacy issues
- key management
- security and privacy issues
- privacy preserving
- personal information
- sensitive data
- identity management
- security risks
- security measures
- security threats
- security services
- access control
- secure multiparty computation
- electronic payment
- protection mechanisms
- security properties
- security requirements
- privacy enhancing
- authentication protocol
- sensitive information
- management system
- privacy concerns
- biometric template
- confidential information
- privacy preserving data mining
- network security
- intrusion detection
- user privacy
- policy enforcement
- social networks
- outsourced databases
- security management
- security level
- rfid technology
- private information
- security policies
- third party
- class labels
- security protocols
- mutual authentication
- differential privacy
- data integrity
- rfid tags
- homomorphic encryption
- multi label