Using sample size to limit exposure to data mining
Journal of Computer Security - Special issue on database security
Proceedings of the Fifth International Conference on Data Engineering
ESORICS '02 Proceedings of the 7th European Symposium on Research in Computer Security
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Achieving k-anonymity privacy protection using generalization and suppression
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
An XPath-based preference language for P3P
WWW '03 Proceedings of the 12th international conference on World Wide Web
Access control in a relational data base management system by query modification
ACM '74 Proceedings of the 1974 annual conference - Volume 1
Design of a Role-Based Trust-Management Framework
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Extending query rewriting techniques for fine-grained access control
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
Trust Negotiations: Concepts, Systems, and Languages
Computing in Science and Engineering
Privacy-Preserving Data Mining: Why, How, and When
IEEE Security and Privacy
Purpose based access control of complex data for privacy protection
Proceedings of the tenth ACM symposium on Access control models and technologies
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Limiting disclosure in hippocratic databases
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
A middleware architecture for privacy protection
Computer Networks: The International Journal of Computer and Telecommunications Networking
User identification for cross-system personalisation
Information Sciences: an International Journal
Towards the development of privacy-aware systems
Information and Software Technology
The Right Expert at the Right Time and Place
PAKM '08 Proceedings of the 7th International Conference on Practical Aspects of Knowledge Management
A purpose-based privacy-aware system using privacy data graph
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
Conditional purpose based access control model for privacy protection
ADC '09 Proceedings of the Twentieth Australasian Conference on Australasian Database - Volume 92
FGAC-QD: fine-grained access control model based on query decomposition strategy
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
A purpose-based access control in native XML databases
Concurrency and Computation: Practice & Experience
Role-based access control to outsourced data in cloud computing
ADC '13 Proceedings of the Twenty-Fourth Australasian Database Conference - Volume 137
Hi-index | 0.00 |
Privacy is today an important concern for both users and enterprises. Therefore, intense research is today being carried out on various aspects of privacy-preserving data management systems. In this paper, we focus on database management systems (DBMS) able to enforce privacy promises encoded in privacy languages such as P3P. In particular, in the paper, we first present an overview of the P3P language and outlines some of its critical aspects. We then outline the main requirements for a privacy-preserving DBMS and we discuss solutions related to the management of privacy-related meta-data, focusing on special category of meta-data information, that is, purpose information. Purpose information represents an important component of privacy statements and thus their effective management is crucial. We then discuss current solutions to to fine-grained access control in the context of relational database systems and identify relevant issues.