Keith Tice

Learn More
Handling of confidential and sensitive data is an important issue facing any professional service provider that wishes to use services from a third party company. This paper describes an infrastructure, the Privacy Infrastructure Appliance that was designed to protect confidential information when outsourcing service fulfillment. A comparison is made with(More)
Sensitive data is increasingly proliferating due to outsourcing, application service provisioning, cloud computing and so on. The control of such data is increasingly crucial for enterprises, because of regulatory scrutiny, data privacy concerns, and so on. One approach to confine storing and processing sensitive data is our Boundary Identity Masking(More)
  • 1