Return to Article Details Data Over-Collection Reduction Model Using Security Level Analysis and Data Access Status Technique Download Download PDF