IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Fundamentals of database systems (2nd ed.)
Fundamentals of database systems (2nd ed.)
Computer matching and personal privacy: can they be compatible?
Proceedings of the symposium on Computers and the quality of life
Security in computing
A gift of fire: social, legal, and ethical issues in computing
A gift of fire: social, legal, and ethical issues in computing
Ethical and social issues in the information age
Ethical and social issues in the information age
Privacy-enhancing technologies: typology, critique, vision
Technology and privacy
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
On the design and quantification of privacy preserving data mining algorithms
PODS '01 Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Secure multi-party computation problems and their applications: a review and open problems
Proceedings of the 2001 workshop on New security paradigms
Computer and Information Ethics
Computer and Information Ethics
On the impact of knowledge discovery and data mining
CRPIT '00 Selected papers from the second Australian Institute conference on Computer ethics
An Integrated Framework for Database Privacy Protection
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
How to Make Personalized Web Browising Simple, Secure, and Anonymous
FC '97 Proceedings of the First International Conference on Financial Cryptography
Tools for privacy preserving distributed data mining
ACM SIGKDD Explorations Newsletter
Disclosure Limitation of Sensitive Rules
KDEX '99 Proceedings of the 1999 Workshop on Knowledge and Data Engineering Exchange
Privacy-enhancing technologies for the Internet
COMPCON '97 Proceedings of the 42nd IEEE International Computer Conference
A Secure Protocol for Computing Dot-Products in Clustered and Distributed Environments
ICPP '02 Proceedings of the 2002 International Conference on Parallel Processing
State-of-the-art in privacy preserving data mining
ACM SIGMOD Record
Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data
IEEE Transactions on Knowledge and Data Engineering
Privacy and Rationality in Individual Decision Making
IEEE Security and Privacy
Maintaining data privacy in association rule mining
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
IT-security and privacy: design and use of privacy-enhancing security mechanisms
IT-security and privacy: design and use of privacy-enhancing security mechanisms
Hi-index | 0.00 |
To date, research has focussed on privacy from a wide perspective, enabling organisations to implement various technologies that contribute to privacy protection. However, in such approaches the perspective of the data subject is often obscured in favour of meeting technical design requirements. The privacy architecture proposed in this paper is premised upon a view of privacy as unique to each individual person, changing over time and maintained through the control of personal data. This conceptualisation of privacy is evidenced by the research literature as well as various legislation. This paper establishes a requirement for a Privacy-Enhancing Technology for operational databases through a consideration of the state of practice and the relevant literature. An architecture for such a technology, which acknowledges and supports this understanding of privacy and which is based upon the Use and Disclosure Principle of the Australian privacy regulation framework, is then proposed. The architecture extends its privacy protection capabilities from primary to secondary data processing applications.