Security and inference in multilevel database and knowledge-base systems
SIGMOD '87 Proceedings of the 1987 ACM SIGMOD international conference on Management of data
Security-control methods for statistical databases: a comparative study
ACM Computing Surveys (CSUR)
Application-controlled demand paging for out-of-core visualization
VIS '97 Proceedings of the 8th conference on Visualization '97
Data integration: a theoretical perspective
Proceedings of the twenty-first ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
What You Always Wanted to Know About Datalog (And Never Dared to Ask)
IEEE Transactions on Knowledge and Data Engineering
Answering queries using views: A survey
The VLDB Journal — The International Journal on Very Large Data Bases
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
A Privacy Policy Model for Enterprises
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Privacy-preserving data integration and sharing
Proceedings of the 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery
Logical foundations of peer-to-peer data integration
PODS '04 Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Data exchange: semantics and query answering
Theoretical Computer Science - Database theory
Data integration: a logic-based perspective
AI Magazine - Special issue on semantic integration
Countering Terrorism through Information and Privacy Protection Technologies
IEEE Security and Privacy
Information integration in the enterprise
Communications of the ACM - Enterprise information integration: and other tools for merging data
A privacy-aware access control system
Journal of Computer Security - 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec'06)
A Hybrid Approach to Private Record Linkage
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
Towards automated security policy enforcement in multi-tenant virtual data centers
Journal of Computer Security - EU-Funded ICT Research on Trust and Security
A firm foundation for private data analysis
Communications of the ACM
Semantic technologies for enterprise cloud management
ISWC'10 Proceedings of the 9th international semantic web conference on The semantic web - Volume Part II
Preserving Privacy in Data Outsourcing
Preserving Privacy in Data Outsourcing
A semantic privacy-preserving model for data sharing and integration
Proceedings of the International Conference on Web Intelligence, Mining and Semantics
Semantics-enabled policies for information sharing and protection in the cloud
SocInfo'11 Proceedings of the Third international conference on Social informatics
Privacy in GLAV information integration
ICDT'07 Proceedings of the 11th international conference on Database Theory
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Review: survey of directly mapping sql databases to the semantic web
The Knowledge Engineering Review
Datalog for security, privacy and trust
Datalog'10 Proceedings of the First international conference on Datalog Reloaded
Towards law-aware semantic cloud policies with exceptions for data integration and protection
Proceedings of the 2nd International Conference on Web Intelligence, Mining and Semantics
Hi-index | 0.00 |
Structured big data of Personal Identifiable Information (PII) are acquired from everywhere and stored as microdata in a statistical database. Given a statistical disclosure control method, big data analysis and protection are enacted for outsourcing data sources. We flexibly glean the data utility to achieve effective data-driven decision-making. However, we still comply with the privacy protection principles while applying data analysis. In this paper, we propose three types of semantics-enabled policies for controlling access, handling data, and releasing data to craft a balance between data utility and protection. Structured big data are tagged with semantic metadata to enable semantics-enabled policy's direct processing and interpretation. Finally, we demonstrate how to craft a balance between data utility and protection with these types of semantics-enabled policies, combined with various statistical disclosure control methods.