Elements of information theory
Elements of information theory
Protecting Respondents' Identities in Microdata Release
IEEE Transactions on Knowledge and Data Engineering
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
The Security and Privacy of Smart Vehicles
IEEE Security and Privacy
Privacy-Preserving Data Mining: Why, How, and When
IEEE Security and Privacy
Data Obfuscation: Anonymity and Desensitization of Usable Data Sets
IEEE Security and Privacy
Managing Multiple and Dependable Identities
IEEE Internet Computing
Countering Terrorism through Information and Privacy Protection Technologies
IEEE Security and Privacy
Privacy Preserving Data Mining
Privacy Preserving Data Mining
SECURING VEHICULAR COMMUNICATIONS
IEEE Wireless Communications
Hi-index | 0.00 |
Detection, identification, authentication and surveillance technologies are increasingly deployed and at the same time further researched, aiming at countering terrorism and crime, protecting people and goods, and managing working procedures and activities. Although, such technologies may also be applied to secure personal data processing, their wide use raises serious concerns. For instance, when they are used for public security reasons, they led to the creation, collection, storage, communication, interconnection and analysis of huge amounts of personal data, even globally. In this paper, after reviewing relevant developments, mentioning key enabling technologies, discussing relevant risks and mentioning social, ethical, legal and political related aspects, we focus on technological issues, namely privacy-related requirements and protection schemes and techniques, which may respond to human rights and liberties related concerns. Basic building elements of protection measures range from more conventional, such as cryptography, access control and auditing to new ones based on information hiding and privacy-preserving data mining techniques. Also, the active involvement of oversight authorities in data protection schemes may significantly increase their effectiveness.