메뉴 건너뛰기




Volumn 4378 LNCS, Issue , 2007, Pages 400-408

A formal model of data privacy

Author keywords

[No Author keywords available]

Indexed keywords

CONSTRAINED OPTIMIZATION; DATA PRIVACY; DATA STRUCTURES; INFORMATION SYSTEMS; RELATIONAL DATABASE SYSTEMS; USER INTERFACES;

EID: 38049174644     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-70881-0_34     Document Type: Conference Paper
Times cited : (18)

References (25)
  • 2
    • 33244494874 scopus 로고    scopus 로고
    • XML data exchange: Consistency and query answering
    • M. Arenas and L. Libkin. XML data exchange: Consistency and query answering. In PODS, pages 13-24, 2005.
    • (2005) PODS , pp. 13-24
    • Arenas, M.1    Libkin, L.2
  • 3
    • 0003727420 scopus 로고    scopus 로고
    • F. Baader, D. Calvanese, D. L. McGuinness, D. Nardi, and P. F. Patel-Schneider, editors, Cambridge University Press
    • F. Baader, D. Calvanese, D. L. McGuinness, D. Nardi, and P. F. Patel-Schneider, editors. The Description Logic Handbook. Cambridge University Press, 2003.
    • (2003) The Description Logic Handbook
  • 4
    • 0021508773 scopus 로고
    • A proof procedure for data dependencies
    • C. Beeri and M. Y. Vardi. A proof procedure for data dependencies. Journal of the ACM, 31(4):718-741, 1984.
    • (1984) Journal of the ACM , vol.31 , Issue.4 , pp. 718-741
    • Beeri, C.1    Vardi, M.Y.2
  • 5
    • 33745659908 scopus 로고    scopus 로고
    • Controlled query evaluation for enforcing confidentiality in complete information systems
    • J. Biskup and P. A. Bonatti. Controlled query evaluation for enforcing confidentiality in complete information systems. International Journal of Information Security, 3(1):14-27, 2004.
    • (2004) International Journal of Information Security , vol.3 , Issue.1 , pp. 14-27
    • Biskup, J.1    Bonatti, P.A.2
  • 7
    • 35048817253 scopus 로고    scopus 로고
    • Data integration under integrity constraints
    • Proc. of CAiSE 2002, of, Springer
    • A. Cali, D. Calvanese, G. D. Giacomo, and M. Lenzerini. Data integration under integrity constraints. In Proc. of CAiSE 2002, volume 2348 of LNCS, pages 262-279. Springer, 2002.
    • (2002) LNCS , vol.2348 , pp. 262-279
    • Cali, A.1    Calvanese, D.2    Giacomo, G.D.3    Lenzerini, M.4
  • 12
    • 33745452090 scopus 로고    scopus 로고
    • The relationship between reasoning about privacy and default logics
    • Springer
    • J. Dix, W. Faber, and V. Subrahmanian. The relationship between reasoning about privacy and default logics. In LPAR, pages 637-650. Springer, 2005.
    • (2005) LPAR , pp. 637-650
    • Dix, J.1    Faber, W.2    Subrahmanian, V.3
  • 14
    • 0035658039 scopus 로고    scopus 로고
    • Answering queries using views: A survey
    • A. Y. Halevy. Answering queries using views: A survey. The VLDB Journal, 10(4):270-294, 2001.
    • (2001) The VLDB Journal , vol.10 , Issue.4 , pp. 270-294
    • Halevy, A.Y.1
  • 16
    • 0036036947 scopus 로고    scopus 로고
    • Data integration: A theoretical perspective
    • ACM Press
    • M. Lenzerini. Data integration: a theoretical perspective. In ACM PODS '02, pages 233-246. ACM Press, 2002.
    • (2002) ACM PODS '02 , pp. 233-246
    • Lenzerini, M.1
  • 18
    • 3142686877 scopus 로고    scopus 로고
    • A formal analysis of information disclosure in data exchange
    • G. Miklau and D. Suciu. A formal analysis of information disclosure in data exchange. In SIGMOD, 2004.
    • (2004) SIGMOD
    • Miklau, G.1    Suciu, D.2
  • 20
    • 38049163774 scopus 로고    scopus 로고
    • Privacy International, Available at
    • Privacy International. Overview of privacy, 2004. Available at http ://www.privacyinternational.org/privhroverview2004.
    • (2004) Overview of privacy
  • 21
    • 38049128642 scopus 로고    scopus 로고
    • R. Reiter. Towards a logical reconstruction of relational database theory. In M. Brodie, J. Mylopoulos, and J. Schmidt, editors, On Conceptual Modelling, Perspectives from Artificial Intelligence, Databases, and Programming Languages, pages 191-233. 1982.
    • R. Reiter. Towards a logical reconstruction of relational database theory. In M. Brodie, J. Mylopoulos, and J. Schmidt, editors, On Conceptual Modelling, Perspectives from Artificial Intelligence, Databases, and Programming Languages, pages 191-233. 1982.
  • 22
    • 0031632776 scopus 로고    scopus 로고
    • Generalizing data to provide anonymity when disclosing information (abstract)
    • ACM Press
    • P. Samarati and L. Sweeney. Generalizing data to provide anonymity when disclosing information (abstract). In PODS, page 188. ACM Press, 1998.
    • (1998) PODS , pp. 188
    • Samarati, P.1    Sweeney, L.2
  • 23
    • 26844576753 scopus 로고    scopus 로고
    • Provable data privacy
    • K. Viborg, J. Debenham, and R. Wagner, editors, Database and Expert Systems Applications DEXA 2005, of, Springer
    • K. Stoffel and T. Studer. Provable data privacy. In K. Viborg, J. Debenham, and R. Wagner, editors, Database and Expert Systems Applications DEXA 2005, volume 3588 of LNCS, pages 324-332. Springer, 2005.
    • (2005) LNCS , vol.3588 , pp. 324-332
    • Stoffel, K.1    Studer, T.2
  • 24
    • 0003221260 scopus 로고    scopus 로고
    • Logical approaches to incomplete information: A survey
    • Kluwer Academic Publishers
    • R. van der Meyden. Logical approaches to incomplete information: a survey. In Logics for databases and information systems, pages 307-356. Kluwer Academic Publishers, 1998.
    • (1998) Logics for databases and information systems , pp. 307-356
    • van der Meyden, R.1
  • 25
    • 0028720693 scopus 로고
    • Formal query languages for secure relational databases
    • M. Winslett, K. Smith, and X. Qian. Formal query languages for secure relational databases. ACM Trans. Database Syst., 19(4):626-662, 1994.
    • (1994) ACM Trans. Database Syst , vol.19 , Issue.4 , pp. 626-662
    • Winslett, M.1    Smith, K.2    Qian, X.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.