The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007) 2007
DOI: 10.1109/secureware.2007.4385312
|View full text |Cite
|
Sign up to set email alerts
|

Classification of Privacy Enhancing Technologies on Life-cycle of Information

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2009
2009
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 1 publication
0
5
0
Order By: Relevance
“…Curzon et al (2019) provided a detailed review of privacy-enhancing technologies, commonly classified as anonymisation (such as masking and disruption of sensitive data) and security techniques (such as hashing and cryptographic techniques), as the broad types of techniques used mostly for personal information privacy protection. The PETs classification proposed by Kang et al (2007) includes three types based on the privacy information life-cycle, including operation technology, common-based technology, and administrative technologies.…”
Section: Privacy-enhancing Technologiesmentioning
confidence: 99%
“…Curzon et al (2019) provided a detailed review of privacy-enhancing technologies, commonly classified as anonymisation (such as masking and disruption of sensitive data) and security techniques (such as hashing and cryptographic techniques), as the broad types of techniques used mostly for personal information privacy protection. The PETs classification proposed by Kang et al (2007) includes three types based on the privacy information life-cycle, including operation technology, common-based technology, and administrative technologies.…”
Section: Privacy-enhancing Technologiesmentioning
confidence: 99%
“…There are some important performance measures of the data aggregation models, such as Network Lifetime, Data Accuracy, and Network Latency [10][11][12][13][14] which are given the definitions as following:…”
Section: Figure 1 Data System Organizationmentioning
confidence: 99%
“…Encryption PI of users is made as a rule. 10 Technical protection measures in PI storage and retention include: encryption of PI file and DB encryption, secure management of backup files and databases, access control of stored PI and logging and secure management of log files.…”
Section: Technical Protection Measures In Personal Information Storag...mentioning
confidence: 99%
“…PI protection technologies necessary in the public environment in Korea were examined from multiple viewpoints with reference to related research. A table of the PI protection technologies, necessary at each processing phase of PI at public institutions, was organized [10] [11]. Effort was made to include every processing phase, section and countermeasure technologies, from the collection phase of PI to the destruction phase.…”
Section: Personal Information Protection Technologies For Each Proces...mentioning
confidence: 99%