A novel Threat Evaluation method for privacy-aware system in RFID.
Yuan TianBiao SongEui-nam HuhPublished in: Int. J. Ad Hoc Ubiquitous Comput. (2011)
Keyphrases
- evaluation method
- privacy aware
- personal information
- evaluation methods
- privacy preservation
- rfid tags
- evaluation model
- data collection
- location based services
- role based access control
- analytic hierarchy process
- fuzzy comprehensive evaluation
- location information
- query engine
- fuzzy comprehensive evaluation method
- data access
- query optimization
- privacy preserving
- privacy policies
- data mining