A complete guide to DB2 universal database
A complete guide to DB2 universal database
Access control in a relational data base management system by query modification
ACM '74 Proceedings of the 1974 annual conference - Volume 1
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Limiting disclosure in hippocratic databases
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Redundancy and information leakage in fine-grained access control
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
WI-IATW '06 Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology
Mining multiple private databases using a kNN classifier
Proceedings of the 2007 ACM symposium on Applied computing
Preserving data privacy in outsourcing data aggregation services
ACM Transactions on Internet Technology (TOIT) - Special Issue on the Internet and Outsourcing
Editorial: Some issues in privacy data management
Data & Knowledge Engineering
Introducing privacy in a hospital information system
Proceedings of the fourth international workshop on Software engineering for secure systems
A three-layered model to implement data privacy policies
Computer Standards & Interfaces
A formal framework for reflective database access control policies
Proceedings of the 15th ACM conference on Computer and communications security
Records retention in relational database systems
Proceedings of the 17th ACM conference on Information and knowledge management
Towards Automated Privacy Compliance in the Information Life Cycle
Advances in Web Semantics I
A practical method for browsing a relational database using a standard search engine
Integrated Computer-Aided Engineering - Selected papers from the IEEE Conference on Information Reuse and Integration (IRI), July 13-15, 2008
Protecting Data Privacy in Structured P2P Networks
Globe '09 Proceedings of the 2nd International Conference on Data Management in Grid and Peer-to-Peer Systems
A conceptual model for privacy policies
SEA '07 Proceedings of the 11th IASTED International Conference on Software Engineering and Applications
An attribute-based authorization policy framework with dynamic conflict resolution
Proceedings of the 9th Symposium on Identity and Trust on the Internet
Fine-grained access control for database management systems
BNCOD'07 Proceedings of the 24th British national conference on Databases
Conditional purpose based access control model for privacy protection
ADC '09 Proceedings of the Twentieth Australasian Conference on Australasian Database - Volume 92
Proceedings of the Fourteenth International Database Engineering & Applications Symposium
A conditional purpose-based access control model with dynamic roles
Expert Systems with Applications: An International Journal
Inheriting access control rules from large relational databases to materialized views automatically
KES'10 Proceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part III
Capturing P3P semantics using an enforceable lattice-based structure
Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society
FGAC-QD: fine-grained access control model based on query decomposition strategy
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
SecDS: a secure EPC discovery service system in EPCglobal network
Proceedings of the second ACM conference on Data and Application Security and Privacy
AccKW: an efficient access control scheme for keyword-based search over RDBMS
DNIS'10 Proceedings of the 6th international conference on Databases in Networked Information Systems
Integrating trust management and access control in data-intensive Web applications
ACM Transactions on the Web (TWEB)
SecTTS: A secure track & trace system for RFID-enabled supply chains
Computers in Industry
A role-involved purpose-based access control model
Information Systems Frontiers
Understanding privacy policies
Empirical Software Engineering
Hi-index | 0.00 |
Databases are at the core of successful businesses. Due to the voluminous stores of personal data being held by companies today, preserving privacy has become a crucial requirement for operating a business. This paper proposes how current relational database management systems can be transformed into their privacy-preserving equivalents. Specifically, we present language constructs and implementation design for fine-grained access control to achieve this goal.