Multi-level security in database management systems
Computers and Security
Security and inference in multilevel database and knowledge-base systems
SIGMOD '87 Proceedings of the 1987 ACM SIGMOD international conference on Management of data
Security checking in relational database management systems augmented with inference engines
Computers and Security
Foundations of deductive databases and logic programming
Foundations of deductive databases and logic programming
Secure Query-Processing Strategies
Computer
Towards the design of a secure data/knowledge base management system
Data & Knowledge Engineering
Design and implementation of a database inference controller
Data & Knowledge Engineering
Security issues for federated database systems
Computers and Security
Data Mining: Technologies, Techniques, Tools, and Trends
Data Mining: Technologies, Techniques, Tools, and Trends
Logic and Data Bases
Security Constraint Processing in a Multilevel Secure Distributed Database Management System
IEEE Transactions on Knowledge and Data Engineering
Access control in a relational data base management system by query modification
ACM '74 Proceedings of the 1974 annual conference - Volume 1
Web Data Mining & Business Intelligence Analysis
Web Data Mining & Business Intelligence Analysis
Hierarchical hippocratic databases with minimal disclosure for virtual organizations
The VLDB Journal — The International Journal on Very Large Data Bases
Security and privacy for multimedia database management systems
Multimedia Tools and Applications
A privacy-aware access control system
Journal of Computer Security - 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec'06)
Data Mining for Security Applications and Its Privacy Implications
Privacy, Security, and Trust in KDD
Security standards for the semantic web
Computer Standards & Interfaces
A Personal Data Audit Method through Requirements Engineering
Computer Standards & Interfaces
Online anonymity protection in computer-mediated communication
IEEE Transactions on Information Forensics and Security
Enhancing user privacy through data handling policies
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Hi-index | 0.00 |
This paper views the privacy problem as a form of inference problem. It first provides an overview of the privacy problem and then introduces the notion of privacy constraints. Next it describes architecture for a privacy-enhanced database management system and discusses algorithms for privacy constraint processing. A note on privacy constraints processing and release control are given next. Finally some directions for future research on privacy are stated.