
Security and Privacy with Respect to Inference ◾ 319
As we have stated earlier, privacy violations could also result due to data mining and
analysis. In this case the challenge is to protect the values of the sensitive attributes of an
individual and make public the results of the mining or analysis. is aspect of privacy
is illustrated in Figure 21.7. A CPT framework should handle both aspects of privacy.
21.6 Trust Management
Researchers are working on protocols for trust management. Languages for specify-
ing trust management constructs are also being developed and there is also research
on the foundations of trust management. For example, ...