Practical data-swapping: the first steps
ACM Transactions on Database Systems (TODS)
A data distortion by probability distribution
ACM Transactions on Database Systems (TODS)
Principles of database and knowledge-base systems, Vol. I
Principles of database and knowledge-base systems, Vol. I
Fundamentals of database systems
Fundamentals of database systems
Security-control methods for statistical databases: a comparative study
ACM Computing Surveys (CSUR)
A survey of intrusion detection techniques
Computers and Security
Database security
Internet security: firewalls and beyond
Communications of the ACM
Protecting data privacy in private information retrieval schemes
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
Secure databases: protection against user influence
ACM Transactions on Database Systems (TODS)
The tracker: a threat to statistical database security
ACM Transactions on Database Systems (TODS)
Secure statistical databases with random sample queries
ACM Transactions on Database Systems (TODS)
A security machanism for statistical database
ACM Transactions on Database Systems (TODS)
Formal Models for Computer Security
ACM Computing Surveys (CSUR)
The statistical security of a statistical database
ACM Transactions on Database Systems (TODS)
Flexible support for multiple access control policies
ACM Transactions on Database Systems (TODS)
A study on the protection of statistical data bases
SIGMOD '77 Proceedings of the 1977 ACM SIGMOD international conference on Management of data
Proceedings of the 11th international conference on World Wide Web
Principles of Database and Knowledge-Base Systems: Volume II: The New Technologies
Principles of Database and Knowledge-Base Systems: Volume II: The New Technologies
Cryptography and data security
Cryptography and data security
Database Systems Concepts
Code and Other Laws of Cyberspace
Code and Other Laws of Cyberspace
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Database Management Systems
Executing SQL over encrypted data in the database-service-provider model
Proceedings of the 2002 ACM SIGMOD international conference on Management of data
Computer
Design of LDV: A Multilevel Secure Relational Database Management
IEEE Transactions on Knowledge and Data Engineering
Declarative Data Cleaning: Language, Model, and Algorithms
Proceedings of the 27th International Conference on Very Large Data Bases
Potter's Wheel: An Interactive Data Cleaning System
Proceedings of the 27th International Conference on Very Large Data Bases
Statistical Databases: Characteristics, Problems, and some Solutions
VLDB '82 Proceedings of the 8th International Conference on Very Large Data Bases
SP '83 Proceedings of the 1983 IEEE Symposium on Security and Privacy
Providing Database as a Service
ICDE '02 Proceedings of the 18th International Conference on Data Engineering
Practical Techniques for Searches on Encrypted Data
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
On the value of private information
TARK '01 Proceedings of the 8th conference on Theoretical aspects of rationality and knowledge
Platform for enterprise privacy practices: privacy-enabled management of customer data
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
An XPath-based preference language for P3P
WWW '03 Proceedings of the 12th international conference on World Wide Web
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14
Information sharing across private databases
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
Using organisational safeguards to make justifiable privacy decisions when processing personal data
SAICSIT '03 Proceedings of the 2003 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology
The semantics of an extended referential integrity for a multilevel secure relational data model
Data & Knowledge Engineering
Policy migration for sensitive credentials in trust negotiation
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Order preserving encryption for numeric data
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
Managing healthcare data hippocratically
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
Privacy-preserving data integration and sharing
Proceedings of the 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery
Impacts of user privacy preferences on personalized systems: a comparative study
Designing personalized user experiences in eCommerce
Mobile databases: a selection of open issues and research directions
ACM SIGMOD Record
Assessing global disclosure risk in masked microdata
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Flocks: distributed proxies for browsing privacy
SAICSIT '04 Proceedings of the 2004 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
Extending Relational Database Systems to Automatically Enforce Privacy Policies
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
On the complexity of optimal K-anonymity
PODS '04 Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Database Security-Concepts, Approaches, and Challenges
IEEE Transactions on Dependable and Secure Computing
Purpose based access control of complex data for privacy protection
Proceedings of the tenth ACM symposium on Access control models and technologies
Usable security and privacy: a case study of developing privacy management tools
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Query execution assurance for outsourced databases
VLDB '05 Proceedings of the 31st international conference on Very large data bases
XPref: a preference language for P3P
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
Maintaining privacy on derived objects
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
A database security course on a shoestring
Proceedings of the 37th SIGCSE technical symposium on Computer science education
Understanding software application interfaces via string analysis
Proceedings of the 28th international conference on Software engineering
Distributed proxies for browsing privacy: a simulation of flocks
SAICSIT '05 Proceedings of the 2005 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
Hierarchical hippocratic databases with minimal disclosure for virtual organizations
The VLDB Journal — The International Journal on Very Large Data Bases
Supporting Colocated Interactions Using RFID and Social Network Displays
IEEE Pervasive Computing
Policy-based security management for federated healthcare databases (or RHIOs)
HIKM '06 Proceedings of the international workshop on Healthcare information and knowledge management
A Bayesian Network Approach to Detecting Privacy Intrusion
WI-IATW '06 Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology
WI-IATW '06 Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology
Enabling the 21st century health care information technology revolution
Communications of the ACM - Spam and the ongoing battle for the inbox
L-diversity: Privacy beyond k-anonymity
ACM Transactions on Knowledge Discovery from Data (TKDD)
Mining multiple private databases using a kNN classifier
Proceedings of the 2007 ACM symposium on Applied computing
GhostDB: querying visible and hidden data without leaks
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
Database-aware semantically-smart storage
FAST'05 Proceedings of the 4th conference on USENIX Conference on File and Storage Technologies - Volume 4
OSDI'04 Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation - Volume 6
Privacy-preserving sharing and correction of security alerts
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Ïnfïnïty: a generic platform for application development and information sharing on mobile devices
MobiDE '07 Proceedings of the 6th ACM international workshop on Data engineering for wireless and mobile access
IEEE Pervasive Computing
Data Management in the Worldwide Sensor Web
IEEE Pervasive Computing
The dynamic predicate: integrating access control with query processing in XML databases
The VLDB Journal — The International Journal on Very Large Data Bases
Beyond purpose-based privacy access control
ADC '07 Proceedings of the eighteenth conference on Australasian database - Volume 63
Preserving data privacy in outsourcing data aggregation services
ACM Transactions on Internet Technology (TOIT) - Special Issue on the Internet and Outsourcing
Privacy preserving decision tree learning over multiple parties
Data & Knowledge Engineering
Editorial: Some issues in privacy data management
Data & Knowledge Engineering
Enabling access-privacy for random walk based data analysis applications
Data & Knowledge Engineering
PRINDA: Architecture and design of non-disclosure agreements in privacy policy framework
Data & Knowledge Engineering
Computer-aided Support for Secure Tropos
Automated Software Engineering
SQL's revoke with a view on privacy
Proceedings of the 2007 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
Physical Access Control for Captured RFID Data
IEEE Pervasive Computing
Chip-secured data access: reconciling access rights with data encryption
VLDB '03 Proceedings of the 29th international conference on Very large data bases - Volume 29
Limiting disclosure in hippocratic databases
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Auditing compliance with a Hippocratic database
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Vision paper: enabling privacy for the paranoids
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
A multi-purpose implementation of mandatory access control in relational database management systems
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
An electronic patient record "on steroids": distributed, peer-to-peer, secure and privacy-conscious
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
On the correctness criteria of fine-grained access control in relational databases
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
GhostDB: hiding data from prying eyes
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
An agent-based approach for privacy-preserving recommender systems
Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems
A privacy augmented collaborative environment (PACE)
ACS'07 Proceedings of the 7th Conference on 7th WSEAS International Conference on Applied Computer Science - Volume 7
Precomputation of privacy policy parameters for auditing SQL queries
Proceedings of the 2nd international conference on Ubiquitous information management and communication
Extended RBAC-based design and implementation for a secure data warehouse
International Journal of Business Intelligence and Data Mining
Online detection of malicious data access using DBMS auditing
Proceedings of the 2008 ACM symposium on Applied computing
A citizen privacy protection model for e-government mashup services
dg.o '08 Proceedings of the 2008 international conference on Digital government research
Preservation of proximity privacy in publishing numerical sensitive data
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Proceedings of the twenty-seventh ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
EVEY: enhancing privacy of service discovery in pervasive computing
Proceedings of the 2007 ACM/IFIP/USENIX international conference on Middleware companion
Design of PriServ, a privacy service for DHTs
PAIS '08 Proceedings of the 2008 international workshop on Privacy and anonymity in information society
A three-layered model to implement data privacy policies
Computer Standards & Interfaces
Purpose based access control for privacy protection in relational database systems
The VLDB Journal — The International Journal on Very Large Data Bases
Enabling policy-based access control in BI applications
Data & Knowledge Engineering
A platform-independent approach for auditing information systems
HDKM '08 Proceedings of the second Australasian workshop on Health data and knowledge management - Volume 80
Detecting anomalous access patterns in relational databases
The VLDB Journal — The International Journal on Very Large Data Bases
Mechanisms for database intrusion detection and response
Proceedings of the 2nd SIGMOD PhD workshop on Innovative database research
Privacy-Aware Access Control through Negotiation in Daily Life Service
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
A Unified Audit Expression Model for Auditing SQL Queries
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
P4A: A New Privacy Model for XML
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
A formal framework for reflective database access control policies
Proceedings of the 15th ACM conference on Computer and communications security
Does enforcing anonymity mean decreasing data usefulness?
Proceedings of the 4th ACM workshop on Quality of protection
Records retention in relational database systems
Proceedings of the 17th ACM conference on Information and knowledge management
Data degradation: making private data less sensitive over time
Proceedings of the 17th ACM conference on Information and knowledge management
Towards the development of privacy-aware systems
Information and Software Technology
The Right Expert at the Right Time and Place
PAKM '08 Proceedings of the 7th International Conference on Practical Aspects of Knowledge Management
FRAPP: a framework for high-accuracy privacy-preserving mining
Data Mining and Knowledge Discovery
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
Query rewriting for detection of privacy violation through inferencing
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Towards Automated Privacy Compliance in the Information Life Cycle
Advances in Web Semantics I
Teaching database security and auditing
Proceedings of the 40th ACM technical symposium on Computer science education
Supporting Evidence-Based Compliance Evaluation for Partial Business Process Outsourcing Scenarios
RELAW '08 Proceedings of the 2008 Requirements Engineering and Law
RBAC-based access control for privacy protection in pervasive environments
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Information disclosure by answers to XPath queries
Journal of Computer Security - Selected papers from the Third and Fourth Secure Data Management (SDM) workshops
Distributed and Parallel Databases
Optimal Privacy-Aware Path in Hippocratic Databases
DASFAA '09 Proceedings of the 14th International Conference on Database Systems for Advanced Applications
Privacy protection in government mashups
Information Polity - Government Information Sharing and Integration: Combining the Social and the Technical. Papers from the 9th International Conference on Digital Government Research (d.g.o.2008)
Controlling and disclosing your personal information
WSEAS Transactions on Information Science and Applications
Personal information privacy protection in e-commerce
WSEAS Transactions on Information Science and Applications
Privacy Enhanced Information Systems
Proceedings of the 2006 conference on Information Modelling and Knowledge Bases XVII
Privacy in location-aware systems
SIGSPATIAL Special
A survey of RFID privacy approaches
Personal and Ubiquitous Computing
Sensitive Data Transaction in Hippocratic Multi-Agent Systems
Engineering Societies in the Agents World IX
BNCOD 26 Proceedings of the 26th British National Conference on Databases: Dataspace: The Final Frontier
Controlling your personal information disclosure
ISP'08 Proceedings of the 7th WSEAS international conference on Information security and privacy
Personal information and privacy in E-commerce application
ISP'08 Proceedings of the 7th WSEAS international conference on Information security and privacy
Relationship Based Privacy Management for Ubiquitous Society
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part I
Protecting Data Privacy in Structured P2P Networks
Globe '09 Proceedings of the 2nd International Conference on Data Management in Grid and Peer-to-Peer Systems
A threat-based privacy preservation system in untrusted environment
Proceedings of the 2009 International Conference on Hybrid Information Technology
XPref: a preference language for P3P
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
Privacy provision in e-learning standardized systems: status and improvements
Computer Standards & Interfaces
No purpose, no data: goal-oriented access control forambient assisted living
Proceedings of the first ACM workshop on Security and privacy in medical and home-care systems
GoCoMM: a governance and compliance maturity model
Proceedings of the first ACM workshop on Information security governance
Privacy-preserving similarity-based text retrieval
ACM Transactions on Internet Technology (TOIT)
Location-aware privacy and more: a systems approach using context-aware database management systems
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS
A Privacy Manager for Cloud Computing
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Splash: ad-hoc querying of data and statistical models
Proceedings of the 13th International Conference on Extending Database Technology
A formal model of data privacy
PSI'06 Proceedings of the 6th international Andrei Ershov memorial conference on Perspectives of systems informatics
Conceptual modeling of privacy-aware web service protocols
CAiSE'07 Proceedings of the 19th international conference on Advanced information systems engineering
Fine-grained access control for database management systems
BNCOD'07 Proceedings of the 24th British national conference on Databases
A composite privacy protection model
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Architecture for data collection in database intrusion detection systems
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
Generating microdata with p-sensitive k-anonymity property
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
Towards improved privacy policy coverage in healthcare using policy refinement
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
A three-dimensional conceptual framework for database privacy
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
Privacy inspection and monitoring framework for automated business processes
WISE'07 Proceedings of the 8th international conference on Web information systems engineering
RELAW '09 Proceedings of the 2009 Second International Workshop on Requirements Engineering and Law
Pluggable personal data servers
Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
An access control model for mobile physical objects
Proceedings of the 15th ACM symposium on Access control models and technologies
Context quality and privacy - friends or rivals?
QuaCon'09 Proceedings of the 1st international conference on Quality of context
A purpose-based privacy-aware system using privacy data graph
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
Revisiting Moor's Towards a Theory of Privacy in the Information Age
ACM SIGCAS Computers and Society
IEEE Transactions on Information Technology in Biomedicine
Privacy-aware access control with generalization boundaries
ACSC '09 Proceedings of the Thirty-Second Australasian Conference on Computer Science - Volume 91
Conditional purpose based access control model for privacy protection
ADC '09 Proceedings of the Twentieth Australasian Conference on Australasian Database - Volume 92
Proceedings of the Fourteenth International Database Engineering & Applications Symposium
Journal of the ACM (JACM)
A conditional purpose-based access control model with dynamic roles
Expert Systems with Applications: An International Journal
A comprehensive privacy-aware authorization framework founded on HIPAA privacy rules
Proceedings of the 1st ACM International Health Informatics Symposium
Inheriting access control rules from large relational databases to materialized views automatically
KES'10 Proceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part III
Joining privately on outsourced data
SDM'10 Proceedings of the 7th VLDB conference on Secure data management
Extending XACML access control architecture for allowing preference-based authorisation
TrustBus'10 Proceedings of the 7th international conference on Trust, privacy and security in digital business
Policy-based management and sharing of sensitive information among government agencies
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Minimal privacy authorization in web services collaboration
Computer Standards & Interfaces
Secure personal data servers: a vision paper
Proceedings of the VLDB Endowment
PolicyReplay: misconfiguration-response queries for data breach reporting
Proceedings of the VLDB Endowment
A privacy policy conflict detection method for multi-owner privacy data protection
Electronic Commerce Research
Analysis of the minimal privacy disclosure for web services collaborations with role mechanisms
Expert Systems with Applications: An International Journal
MyABDAC: compiling XACML policies for attribute-based database access control
Proceedings of the first ACM conference on Data and application security and privacy
Social order in Hippocratic multi-agent systems
IEA/AIE'10 Proceedings of the 23rd international conference on Industrial engineering and other applications of applied intelligent systems - Volume Part II
Capturing P3P semantics using an enforceable lattice-based structure
Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society
A conceptual framework for information security and privacy
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
GIS analysis of U.S. patent data: examining local innovation patterns
Proceedings of the 2nd International Conference on Computing for Geospatial Research & Applications
Query rewriting in spatial database for access control
Proceedings of the 2nd International Conference on Computing for Geospatial Research & Applications
RFID enabled traceability networks: a survey
Distributed and Parallel Databases
Purpose control: did you process the data for the intended purpose?
SDM'11 Proceedings of the 8th VLDB international conference on Secure data management
Cloning for privacy protection in multiple independent data publications
Proceedings of the 20th ACM international conference on Information and knowledge management
A novel Threat Evaluation method for privacy-aware system in RFID
International Journal of Ad Hoc and Ubiquitous Computing
A data masking technique for data warehouses
Proceedings of the 15th Symposium on International Database Engineering & Applications
A new conceptual framework within information privacy: meta privacy
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Efficient key updates in encrypted database systems
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Detecting privacy violations in sensitive XML databases
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Attacking confidentiality: an agent based approach
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
An analytical solution for consent management in patient privacy preservation
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium
Extracting global policies for efficient access control of XML documents
WISE'05 Proceedings of the 6th international conference on Web Information Systems Engineering
Privacy is linking permission to purpose
SP'04 Proceedings of the 12th international conference on Security Protocols
Extending SQL to allow the active usage of purposes
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
DEXA'05 Proceedings of the 16th international conference on Database and Expert Systems Applications
Privacy analysis using ontologies
Proceedings of the second ACM conference on Data and Application Security and Privacy
Privacy-Preserving database systems
Foundations of Security Analysis and Design III
Security and trust requirements engineering
Foundations of Security Analysis and Design III
Performance-oriented privacy-preserving data integration
DILS'05 Proceedings of the Second international conference on Data Integration in the Life Sciences
Minimal disclosure in hierarchical hippocratic databases with delegation
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Information disclosure by XPath queries
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
SPIDER: an autonomic computing approach to database security management
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Privacy-preserving queries on encrypted data
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Privacy preservation and protection by extending generalized partial indices
BNCOD'06 Proceedings of the 23rd British National Conference on Databases, conference on Flexible and Efficient Information Handling
Privacy injector — automated privacy enforcement through aspects
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Balancing smartness and privacy for the ambient intelligence
EuroSSC'06 Proceedings of the First European conference on Smart Sensing and Context
Watermarking essential data structures for copyright protection
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Malafide intension based detection of privacy violation in information system
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Formalizing and reasoning with p3p policies using a semantic web ontology
MIWAI'11 Proceedings of the 5th international conference on Multi-Disciplinary Trends in Artificial Intelligence
More than modelling and hiding: towards a comprehensive view of Web mining and privacy
Data Mining and Knowledge Discovery
A contextual privacy-aware access control model for network monitoring workflows: work in progress
FPS'11 Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security
A purpose-based access control in native XML databases
Concurrency and Computation: Practice & Experience
A role-involved purpose-based access control model
Information Systems Frontiers
Enhancing privacy in cloud computing via policy-based obfuscation
The Journal of Supercomputing
Privacy aware eLearning environments based on hippocratic database principles
Proceedings of the Fifth Balkan Conference in Informatics
Usage control in service-oriented architectures
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
Using purpose lattices to facilitate customisation of privacy agreements
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
Integrated intrusion detection in databases
LADC'07 Proceedings of the Third Latin-American conference on Dependable Computing
Partitioning applications for hybrid and federated clouds
CASCON '12 Proceedings of the 2012 Conference of the Center for Advanced Studies on Collaborative Research
Privacy analysis in mobile social networks: the influential factors for disclosure of personal data
International Journal of Wireless and Mobile Computing
FENCE: continuous access control enforcement in dynamic data stream environments
Proceedings of the third ACM conference on Data and application security and privacy
An SOA-Based Architecture to Share Medical Data with Privacy Preservation
International Journal of Organizational and Collective Intelligence
MinExp-card: limiting data collection using a smart card
Proceedings of the 16th International Conference on Extending Database Technology
A privacy preserving model bridging data provider and collector preferences
Proceedings of the Joint EDBT/ICDT 2013 Workshops
International Journal of Reliable and Quality E-Healthcare
The power of data use management in action
Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data
Defining the paperless workplace with the paper metaphor: not a contradiction in terms
HIKM '11 Proceedings of the Fourth Australasian Workshop on Health Informatics and Knowledge Management - Volume 120
A privacy preserving framework for managing vehicle data in road pricing systems
Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining
Redeem with privacy (RWP): privacy protecting framework for geo-social commerce
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
A privacy-aware access control model for distributed network monitoring
Computers and Electrical Engineering
Future Generation Computer Systems
XML privacy protection model based on cloud storage
Computer Standards & Interfaces
Dividing secrets to secure data outsourcing
Information Sciences: an International Journal
Web Intelligence and Agent Systems
Hi-index | 0.00 |
The Hippocratic Oath has guided the conduct of physicians for centuries. Inspired by its tenet of preserving privacy, we argue that future database systems must include responsibility for the privacy of data they manage as a founding tenet. We enunciate the key privacy principles for such Hippocratic database systems. We propose a strawman design for Hippocratic databases, identify the technical challenges and problems in designing such databases, and suggest some approaches that may lead to solutions. Our hope is that this paper will serve to catalyze a fruitful and exciting direction for future database research.