Achieving k-anonymity privacy protection using generalization and suppression
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Lineage tracing for general data warehouse transformations
The VLDB Journal — The International Journal on Very Large Data Bases
State-of-the-art in privacy preserving data mining
ACM SIGMOD Record
Privacy-preserving data integration and sharing
Proceedings of the 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery
Database Security-Concepts, Approaches, and Challenges
IEEE Transactions on Dependable and Secure Computing
DBNotes: a post-it system for relational databases based on provenance
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
PRIVATE-IYE: A Framework for Privacy Preserving Data Integration
ICDEW '06 Proceedings of the 22nd International Conference on Data Engineering Workshops
A comparison of two privacy policy languages: EPAL and XACML
Proceedings of the 3rd ACM workshop on Secure web services
Research in data warehouse modeling and design: dead or alive?
DOLAP '06 Proceedings of the 9th ACM international workshop on Data warehousing and OLAP
Modeling Delegation through an i*-based Approach
IAT '06 Proceedings of the IEEE/WIC/ACM international conference on Intelligent Agent Technology
Enabling the 21st century health care information technology revolution
Communications of the ACM - Spam and the ongoing battle for the inbox
L-diversity: Privacy beyond k-anonymity
ACM Transactions on Knowledge Discovery from Data (TKDD)
Intensional associations between data and metadata
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
Privacy-aware role based access control
Proceedings of the 12th ACM symposium on Access control models and technologies
A roadmap for comprehensive online privacy policy management
Communications of the ACM - Creating a science of games
iMONDRIAN: a visual tool to annotate and query scientific databases
EDBT'06 Proceedings of the 10th international conference on Advances in Database Technology
Privacy preserving event driven integration for interoperating social and health systems
SDM'10 Proceedings of the 7th VLDB conference on Secure data management
Hi-index | 0.00 |
In this paper we discuss the problem of engineering privacy requirements for business intelligence applications, i.e., of eliciting, modeling, testing, and auditing privacy requirements imposed by the source data owner on the business intelligence applications that use these data to compute reports for analysts. We describe the peculiar challenges of this problem, propose and evaluate different solutions for eliciting and modeling such requirements, and make the case in particular for what we experienced as being the most promising and realistic approach: eliciting and modeling privacy requirements on the reports themselves, rather than on the source or as part of the data warehouse.