•  
  •  
 

International Journal of Computer and Communication Technology

Abstract

Privacy preservation is an important aspect in field of counter terrorism. In the present scenario terrorist attacks are biggest problem for the mankind and whole world is under constant threat from these well-planned, sophisticated and coordinated terrorist operations. Now every country is focusing for counter terrorism. Government agencies are collecting the data from various sources and using that data to connect the dots to detect the terrorist group’s activities and prevent the peoples from terrorist attacks. There are some chances that information may be misused by agencies. Different countries are having government agencies which are dealing with the counter terrorism but they are not sharing the data with each other because they don’t want to disclose sensitive data. Alone a country can’t fight against the terrorism. In this paper we are proposing a model so that these agencies can share the information without violation of the privacy.

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.