Security-control methods for statistical databases: a comparative study
ACM Computing Surveys (CSUR)
IEEE Transactions on Software Engineering
Tuple-level vs. element-level classification
Results of the Sixth Working Conference of IFIP Working Group 11.3 on Database Security on Database security, VI : status and prospects: status and prospects
Database security
Role-Based Access Control Models
Computer
Database management systems
A complete guide to DB2 universal database
A complete guide to DB2 universal database
An authorization mechanism for a relational data base system
SIGMOD '76 Proceedings of the 1976 ACM SIGMOD international conference on Management of data
Access control in a relational data base management system by query modification
ACM '74 Proceedings of the 1974 annual conference - Volume 1
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Extending Relational Database Systems to Automatically Enforce Privacy Policies
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Purpose based access control of complex data for privacy protection
Proceedings of the tenth ACM symposium on Access control models and technologies
Towards a dynamic multi-policy dissemination control model: (DMDCON)
ACM SIGMOD Record
Redundancy and information leakage in fine-grained access control
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Interactive query formulation over web service-accessed sources
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Hierarchical hippocratic databases with minimal disclosure for virtual organizations
The VLDB Journal — The International Journal on Very Large Data Bases
L-diversity: Privacy beyond k-anonymity
ACM Transactions on Knowledge Discovery from Data (TKDD)
CLIDE: interactive query formulation for service oriented architectures
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
Ïnfïnïty: a generic platform for application development and information sharing on mobile devices
MobiDE '07 Proceedings of the 6th ACM international workshop on Data engineering for wireless and mobile access
Enabling access-privacy for random walk based data analysis applications
Data & Knowledge Engineering
Exporting and interactively querying Web service-accessed sources: The CLIDE System
ACM Transactions on Database Systems (TODS)
Auditing compliance with a Hippocratic database
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
On the correctness criteria of fine-grained access control in relational databases
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Precomputation of privacy policy parameters for auditing SQL queries
Proceedings of the 2nd international conference on Ubiquitous information management and communication
Design of PriServ, a privacy service for DHTs
PAIS '08 Proceedings of the 2008 international workshop on Privacy and anonymity in information society
Purpose based access control for privacy protection in relational database systems
The VLDB Journal — The International Journal on Very Large Data Bases
A platform-independent approach for auditing information systems
HDKM '08 Proceedings of the second Australasian workshop on Health data and knowledge management - Volume 80
Privacy-Aware Access Control through Negotiation in Daily Life Service
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
Dynamic Meta-level Access Control in SQL
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
P4A: A New Privacy Model for XML
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
A formal framework for reflective database access control policies
Proceedings of the 15th ACM conference on Computer and communications security
Towards the development of privacy-aware systems
Information and Software Technology
A Privacy-Protecting Business-Analytics Service for On-Line Transactions
International Journal of Electronic Commerce
FRAPP: a framework for high-accuracy privacy-preserving mining
Data Mining and Knowledge Discovery
Query rewriting for detection of privacy violation through inferencing
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
RBAC-based access control for privacy protection in pervasive environments
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Protecting Data Privacy in Structured P2P Networks
Globe '09 Proceedings of the 2nd International Conference on Data Management in Grid and Peer-to-Peer Systems
Location-aware privacy and more: a systems approach using context-aware database management systems
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS
Composing data-providing web services in P2P-based collaboration environments
CAiSE'07 Proceedings of the 19th international conference on Advanced information systems engineering
A composite privacy protection model
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Fine-grained access control for EPC information services
IOT'08 Proceedings of the 1st international conference on The internet of things
Personalizing access control by generalizing access control
Proceedings of the 15th ACM symposium on Access control models and technologies
Privacy-aware access control with generalization boundaries
ACSC '09 Proceedings of the Thirty-Second Australasian Conference on Computer Science - Volume 91
Conditional purpose based access control model for privacy protection
ADC '09 Proceedings of the Twentieth Australasian Conference on Australasian Database - Volume 92
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
A conditional purpose-based access control model with dynamic roles
Expert Systems with Applications: An International Journal
Joining privately on outsourced data
SDM'10 Proceedings of the 7th VLDB conference on Secure data management
Policy-based management and sharing of sensitive information among government agencies
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
PolicyReplay: misconfiguration-response queries for data breach reporting
Proceedings of the VLDB Endowment
Access Control for Databases: Concepts and Systems
Foundations and Trends in Databases
The relationship between reasoning about privacy and default logics
LPAR'05 Proceedings of the 12th international conference on Logic for Programming, Artificial Intelligence, and Reasoning
An analytical solution for consent management in patient privacy preservation
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium
Extending SQL to allow the active usage of purposes
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
SecDS: a secure EPC discovery service system in EPCglobal network
Proceedings of the second ACM conference on Data and Application Security and Privacy
An information theoretic privacy and utility measure for data sanitization mechanisms
Proceedings of the second ACM conference on Data and Application Security and Privacy
Privacy-Preserving database systems
Foundations of Security Analysis and Design III
Minimal disclosure in hierarchical hippocratic databases with delegation
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
AccKW: an efficient access control scheme for keyword-based search over RDBMS
DNIS'10 Proceedings of the 6th international conference on Databases in Networked Information Systems
Privacy preservation and protection by extending generalized partial indices
BNCOD'06 Proceedings of the 23rd British National Conference on Databases, conference on Flexible and Efficient Information Handling
Malafide intension based detection of privacy violation in information system
ICISS'06 Proceedings of the Second international conference on Information Systems Security
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Cloaking data to ease view creation, query expression, and query execution
Conceptual Modelling and Its Theoretical Foundations
SecTTS: A secure track & trace system for RFID-enabled supply chains
Computers in Industry
A role-involved purpose-based access control model
Information Systems Frontiers
Privacy aware eLearning environments based on hippocratic database principles
Proceedings of the Fifth Balkan Conference in Informatics
An SOA-Based Architecture to Share Medical Data with Privacy Preservation
International Journal of Organizational and Collective Intelligence
Auditing a database under retention policies
The VLDB Journal — The International Journal on Very Large Data Bases
Defining the paperless workplace with the paper metaphor: not a contradiction in terms
HIKM '11 Proceedings of the Fourth Australasian Workshop on Health Informatics and Knowledge Management - Volume 120
Secure and privacy-preserving execution model for data services
CAiSE'13 Proceedings of the 25th international conference on Advanced Information Systems Engineering
Role-based access control to outsourced data in cloud computing
ADC '13 Proceedings of the Twenty-Fourth Australasian Database Conference - Volume 137
PAIRSE: a privacy-preserving service-oriented data integration system
ACM SIGMOD Record
A privacy-aware access control model for distributed network monitoring
Computers and Electrical Engineering
Hi-index | 0.00 |
We present a practical and efficient approach to incorporating privacy policy enforcement into an existing application and database environment, and we explore some of the semantic tradeoffs introduced by enforcing these privacy policy rules at cell-level granularity. Through a comprehensive set of performance experiments, we show that the cost of privacy enforcement is small, and scalable to large databases.