2020 23rd International Symposium on Wireless Personal Multimedia Communications (WPMC) 2020
DOI: 10.1109/wpmc50192.2020.9309459
|View full text |Cite
|
Sign up to set email alerts
|

State-of-the-art in Privacy Preservation for Enterprise Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…If users feel that their personal information has been violated or leaked, their low trust in network companies will decline sharply, and then reduce or stop using relevant services, which will inevitably lead to user loss, and increasingly stringent laws and regulations. For example, the implementation of the GDPR will lead to more serious illegal problems [13].…”
Section: Potential User Loss and Illegal Problemsmentioning
confidence: 99%
“…If users feel that their personal information has been violated or leaked, their low trust in network companies will decline sharply, and then reduce or stop using relevant services, which will inevitably lead to user loss, and increasingly stringent laws and regulations. For example, the implementation of the GDPR will lead to more serious illegal problems [13].…”
Section: Potential User Loss and Illegal Problemsmentioning
confidence: 99%
“…Several practices like [6] PEC -privacy aware edge computing, [7] Privacy-Preserving Asynchronous Federated Learning Mechanism for Edge Network Computing (PAFLM) and many other techniques are being used to deal with privacy preservation of data in edge devices. [8] has more details on the existing practices for privacy preservation of Enterprise data in general.…”
Section: Existing Practicesmentioning
confidence: 99%
“…Individual methods evaluated in the table below are not explained in detail in this paper. More on these methods can be found in the paper reference [8].…”
Section: Evaluating Different Approaches For Enterprise Data Anonymiz...mentioning
confidence: 99%