A General Additive Data Perturbation Method for Database Security
Management Science
Security in Computing
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
The role of cryptography in database security
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
Top-Down Specialization for Information and Privacy Preservation
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Extending Relational Database Systems to Automatically Enforce Privacy Policies
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
\ell -Diversity: Privacy Beyond \kappa -Anonymity
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
Provably Secure Anonymous Access Control for Heterogeneous Trusts
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
End-to-End Trustworthy Data Access in Data-Oriented Scientific Computing
CCGRID '06 Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid
Personalization in privacy-aware highly dynamic systems
Communications of the ACM - Privacy and security in highly dynamic systems
Communications of the ACM - Privacy and security in highly dynamic systems
A Privacy-Aware Service-oriented Platform for Distributed Data Mining
CEC-EEE '06 Proceedings of the The 8th IEEE International Conference on E-Commerce Technology and The 3rd IEEE International Conference on Enterprise Computing, E-Commerce, and E-Services
Secure Groups: Enhanced Management of Encrypted Data in Databases
ENC '06 Proceedings of the Seventh Mexican International Conference on Computer Science
A Novel Method for Protecting Sensitive Knowledge in Association Rules Mining
ISDA '06 Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications - Volume 01
Privacy-Aware Autonomous Agents for Pervasive Healthcare
IEEE Intelligent Systems
Trust Negotiations with Customizable Anonymity
WI-IATW '06 Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology
Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
A secure architecture for the pseudonymization of medical data
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
Security Requirements for a Semantic Service-oriented Architecture
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
Trust Negotiation in Identity Management
IEEE Security and Privacy
PP-trust-X: A system for privacy preserving trust negotiations
ACM Transactions on Information and System Security (TISSEC)
Embedding Information Security into the Organization
IEEE Security and Privacy
Building Privacy into Software Products and Services
IEEE Security and Privacy
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Relationship Based Privacy Management for Ubiquitous Society
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part I
Inter-cloud data integration system considering privacy and cost
ICCCI'10 Proceedings of the Second international conference on Computational collective intelligence: technologies and applications - Volume PartI
Dynamic content-based cloud data integration system with privacy and cost concern
Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference
Extracting trust information from security system of a service
Journal of Network and Computer Applications
Hi-index | 0.00 |
An increasing number of business-to-business and business-to-customer services are accomplished by means of web technologies and mobile devices. As a consequence, sensitive data are continuously exposed to the risk of being delivered to final users or intermediary actors taking part to the data transactions, who could not have the proper access rights to obtain those data. These new generation of services are often characterized by high dynamism and untrustworthiness: existing technologies for managing and applying data privacy policies could be unsuccessful when dealing with this kind of contexts, as they could require too many resources, degrade the data quality to an unacceptable level, be too pervasive for data sources or data requestors. Moreover, industrial and research community is beginning to perceive the need to embed the mechanisms for preserving data privacy within the software product and process, as it comes to light from the recent literature. This paper proposes an approach to manage data privacy, inspired to the front-end trust filter paradigm, which aims at guaranteeing high flexibility, reducing the resources required, and limiting the pervasiveness into applications and devices involved into the data exchange. Our approach has the potential to curtail the change impact due to the dynamism and to foster the reuse of strategies, and their implementations, also across organizations.