Auditing of information privacy

被引:0
|
作者
Department of Management Information Systems, College of Information Technology, University of Bahrain, P.O. Box 32038, Bahrain [1 ]
机构
来源
Inf. Technol. J. | 2006年 / 1卷 / 177-182期
关键词
D O I
10.3923/itj.2006.177.182
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] Auditing and inference control for privacy preservation in uncertain environments
    An, Xiangdong
    Jutla, Dawn
    Cercone, Nick
    SMART SENSING AND CONTEXT, PROCEEDINGS, 2006, 4272 : 159 - +
  • [22] Privacy-Preserving Cloud Auditing with Multiple Uploaders
    Wu, Ge
    Mu, Yi
    Susilo, Willy
    Guo, Fuchun
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2016, 2016, 10060 : 224 - 237
  • [23] Cloud auditing and authentication scheme for establishing privacy preservation
    Bingu, Rajesh
    Jothilakshmi, S.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (15) : 43849 - 43870
  • [24] Cloud Data Auditing Techniques with a Focus on Privacy and Security
    Kolhar, Manjur
    Abu-Alhaj, Mosleh M.
    Abd El-atty, Saied M.
    IEEE SECURITY & PRIVACY, 2017, 15 (01) : 42 - 51
  • [25] Privacy preserving auditing protocol for remote data storage
    Suguna, M.
    Shalinie, S. Mercy
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 3): : S6891 - S6898
  • [26] Privacy preserving auditing protocol for remote data storage
    M. Suguna
    S. Mercy Shalinie
    Cluster Computing, 2019, 22 : 6891 - 6898
  • [27] Preserving Privacy in Public Auditing for Shared Cloud Data
    Anjali, R. S.
    Ravikumar, Aswathy
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 2, 2016, : 11 - 16
  • [28] Information privacy?
    Camenisch, Jan
    COMPUTER NETWORKS, 2012, 56 (18) : 3834 - 3848
  • [29] Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data
    Gao, Xiang
    Yu, Jia
    Chang, Yan
    Wang, Huaqun
    Fan, Jianxi
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (06) : 3774 - 3789
  • [30] Information privacy/information property
    Litman, J
    STANFORD LAW REVIEW, 2000, 52 (05) : 1283 - 1313