IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Database security
Handbook of Applied Cryptography
Handbook of Applied Cryptography
A Privacy Policy Model for Enterprises
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Intrusion Detection in Real-Time Database Systems via Time Signatures
RTAS '00 Proceedings of the Sixth IEEE Real Time Technology and Applications Symposium (RTAS 2000)
DEXA '03 Proceedings of the 14th International Workshop on Database and Expert Systems Applications
State-of-the-art in privacy preserving data mining
ACM SIGMOD Record
Privacy management for portable recording devices
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Conflict and combination in privacy policy languages
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Data Privacy through Optimal k-Anonymization
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
An Audit Logic for Accountability
POLICY '05 Proceedings of the Sixth IEEE International Workshop on Policies for Distributed Systems and Networks
Intrusion Detection in RBAC-administered Databases
ACSAC '05 Proceedings of the 21st Annual Computer Security Applications Conference
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Vision paper: enabling privacy for the paranoids
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Hi-index | 0.00 |
Personal information privacy could be compromised during information collection, transmission, and handling. In information handling, privacy could be violated by both the inside and the outside intruders. Though, within an organization, private data are generally protected by the organization's privacy policies and the corresponding platforms for privacy practices, private data could still be misused intentionally or unintentionally by individuals who have legitimate access to them in the organization. In this paper, we propose a Bayesian network-based method for insider privacy intrusion detection in database systems.