Deputy Mechanisms for Object-Oriented Databases
ICDE '95 Proceedings of the Eleventh International Conference on Data Engineering
Alogtime Algorithms for Tree Isomorphism, Comparison, and Canonization
KGC '97 Proceedings of the 5th Kurt Gödel Colloquium on Computational Logic and Proof Theory
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Data Privacy through Optimal k-Anonymization
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Database Security-Concepts, Approaches, and Challenges
IEEE Transactions on Dependable and Secure Computing
Purpose based access control of complex data for privacy protection
Proceedings of the tenth ACM symposium on Access control models and technologies
Mondrian Multidimensional K-Anonymity
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
\ell -Diversity: Privacy Beyond \kappa -Anonymity
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
Personalized privacy preservation
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Reductions between the Subgraph Isomorphism Problem and Hamiltonian and SAT Problems
CONIELECOMP '07 Proceedings of the 17th International Conference on Electronics, Communications and Computers
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Provisions and obligations in policy management and security applications
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
A composite privacy protection model
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Indistinguishability: the other aspect of privacy
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Electronic Commerce Research
Hi-index | 0.00 |
The current privacy-preserving researches focus on single-owner privacy data. However, multi-owner privacy data, which is also a widespread privacy data, need to be properly protected. At first, the characteristics of multi-owner privacy data and its protection requirement is introduced in this paper. Secondly, a data schema based on deputy mechanism for multi-owner privacy data is proposed. Thirdly, based on the schema, this paper proposes a privacy policy conflict detection method based on sub-graph isomorphic. This method models the privacy policy and each possible policy conflict pattern as a stratified-directed graph (SDG), and provides an algorithm to detect whether the SDG of a privacy conflict mode is isomorphic to that of privacy policies.