메뉴 건너뛰기




Volumn 30, Issue 6, 2008, Pages 398-409

A three-layered model to implement data privacy policies

Author keywords

Data privacy; Front end trust filter; Security Software Engineering

Indexed keywords

CANNING; DATA PRIVACY; FIBER OPTIC SENSORS; INDUSTRIAL RESEARCH; MOBILE DEVICES; RISKS; TECHNOLOGY; TELECOMMUNICATION EQUIPMENT; UBIQUITOUS COMPUTING;

EID: 44949150286     PISSN: 09205489     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.csi.2008.03.008     Document Type: Article
Times cited : (11)

References (34)
  • 2
    • 28444446666 scopus 로고    scopus 로고
    • Extending relational database systems to automatically enforce privacy policy
    • IEEE Computer Society, Los Alamitos
    • Agrawal R., Bird P., Grandison T., Kiernan J., Logan S., and Rjaibt W. Extending relational database systems to automatically enforce privacy policy. Proc. ICDE'05, IEEE Proceedings Vol. (2005), IEEE Computer Society, Los Alamitos 1013-1022
    • (2005) Proc. ICDE'05, IEEE Proceedings Vol. , pp. 1013-1022
    • Agrawal, R.1    Bird, P.2    Grandison, T.3    Kiernan, J.4    Logan, S.5    Rjaibt, W.6
  • 3
    • 24944578141 scopus 로고    scopus 로고
    • Enterprise Privacy Authorization Language (EPAL 1.1)
    • (available at: http://www.zurich.ibm.com/security/enterprice-privacy/epal - last access on 19.02.07)
    • Ashley P., Hada S., Karjoth G., Powers C., and Schunter M. Enterprise Privacy Authorization Language (EPAL 1.1). IBM Research Report (2003). http://www.zurich.ibm.com/security/enterprice-privacy/epal (available at: http://www.zurich.ibm.com/security/enterprice-privacy/epal - last access on 19.02.07)
    • (2003) IBM Research Report
    • Ashley, P.1    Hada, S.2    Karjoth, G.3    Powers, C.4    Schunter, M.5
  • 4
    • 0141717704 scopus 로고    scopus 로고
    • Technology solutions for protecting privacy
    • IEEE Computer Society
    • Bayardo R.J., and Srikant R. Technology solutions for protecting privacy. Computer vol. 36(9) (2003), IEEE Computer Society 115-118
    • (2003) Computer , vol.36 9 , pp. 115-118
    • Bayardo, R.J.1    Srikant, R.2
  • 6
    • 34547697571 scopus 로고    scopus 로고
    • A database encryption scheme for enhanced security and easy sharing
    • IEEE Computer Society, Los Alamitos
    • Chen G., Chen K., and Dong J. A database encryption scheme for enhanced security and easy sharing. Proc. CSCWD'06, IEEE Proceedings (2006), IEEE Computer Society, Los Alamitos 1-6
    • (2006) Proc. CSCWD'06, IEEE Proceedings , pp. 1-6
    • Chen, G.1    Chen, K.2    Dong, J.3
  • 7
    • 34547532673 scopus 로고    scopus 로고
    • A novel method for protecting sensitive knowledge in association rules mining
    • IEEE Computer Society, Los Alamitos
    • Chen T. A novel method for protecting sensitive knowledge in association rules mining. Proc. ISDA'06, IEEE Proceedings (2006), IEEE Computer Society, Los Alamitos 694-699
    • (2006) Proc. ISDA'06, IEEE Proceedings , pp. 694-699
    • Chen, T.1
  • 8
    • 34548190327 scopus 로고    scopus 로고
    • Security requirements for a semantic service-oriented architecture
    • IEEE Computer Society, Los Alamitos
    • Durbeck S., Schillinger R., and Kolter J. Security requirements for a semantic service-oriented architecture. Proc. ARES'07, IEEE Proceedings (2007), IEEE Computer Society, Los Alamitos 356-365
    • (2007) Proc. ARES'07, IEEE Proceedings , pp. 356-365
    • Durbeck, S.1    Schillinger, R.2    Kolter, J.3
  • 9
    • 28444499680 scopus 로고    scopus 로고
    • Top-down specialization for information and privacy preservation
    • IEEE Computer Society, Los Alamitos
    • Fung C.M., Wang K., and Yu S.P. Top-down specialization for information and privacy preservation. Proc. ICDE'05, IEEE Proceedings (2005), IEEE Computer Society, Los Alamitos 206-216
    • (2005) Proc. ICDE'05, IEEE Proceedings , pp. 206-216
    • Fung, C.M.1    Wang, K.2    Yu, S.P.3
  • 10
    • 34547395826 scopus 로고    scopus 로고
    • Secure groups: enhanced management of encrypted data in databases
    • IEEE Computer Society, Los Alamitos
    • Gonzalez-Campos J.S. Secure groups: enhanced management of encrypted data in databases. Proc. ENC'06, IEEE Proceedings (2006), IEEE Computer Society, Los Alamitos 92-100
    • (2006) Proc. ENC'06, IEEE Proceedings , pp. 92-100
    • Gonzalez-Campos, J.S.1
  • 11
    • 34548145633 scopus 로고    scopus 로고
    • Using privacy process patterns for incorporating privacy requirements into the system design process
    • IEEE Computer Society, Los Alamitos
    • Kalloniatis C., Kavakli E., and Gritzalis S. Using privacy process patterns for incorporating privacy requirements into the system design process. Proc. ARES'07, IEEE Proceedings (2007), IEEE Computer Society, Los Alamitos 1009-1017
    • (2007) Proc. ARES'07, IEEE Proceedings , pp. 1009-1017
    • Kalloniatis, C.1    Kavakli, E.2    Gritzalis, S.3
  • 12
    • 34250030055 scopus 로고    scopus 로고
    • Building privacy into software products and services
    • IEEE Computer Society (3)
    • Knutson T. Building privacy into software products and services. IEEE Security and Privacy vol. 5 (2007), IEEE Computer Society 72-74 (3)
    • (2007) IEEE Security and Privacy , vol.5 , pp. 72-74
    • Knutson, T.1
  • 13
    • 44949126838 scopus 로고    scopus 로고
    • M. Langheinrich, Personal privacy in ubiquitous computing - tools and system support, PhD. Dissertation, ETH Zurich, 2005.
    • M. Langheinrich, Personal privacy in ubiquitous computing - tools and system support, PhD. Dissertation, ETH Zurich, 2005.
  • 14
    • 34250015784 scopus 로고    scopus 로고
    • Embedding information security into the organization
    • IEEE Computer Society (3)
    • Johnson M.E., and Goetz E. Embedding information security into the organization. IEEE Security and Privacy vol. 5 (2007), IEEE Computer Society 16-24 (3)
    • (2007) IEEE Security and Privacy , vol.5 , pp. 16-24
    • Johnson, M.E.1    Goetz, E.2
  • 16
    • 3142752802 scopus 로고    scopus 로고
    • The role of cryptography in database security
    • ACM, New York
    • Maurer U. The role of cryptography in database security. Proc. SIGMOD'04, ACM Proceedings (2004), ACM, New York 5-10
    • (2004) Proc. SIGMOD'04, ACM Proceedings , pp. 5-10
    • Maurer, U.1
  • 17
    • 0033207750 scopus 로고    scopus 로고
    • A general additive data perturbation method for database security
    • INFORMS (10)
    • Muralidhar K., Parsa R., and Sarathy R. A general additive data perturbation method for database security. Management Science vol. 45 (1999), INFORMS 1399-1415 (10)
    • (1999) Management Science , vol.45 , pp. 1399-1415
    • Muralidhar, K.1    Parsa, R.2    Sarathy, R.3
  • 18
    • 34248326773 scopus 로고    scopus 로고
    • Ultra-large-scale system. The software challenge of the future
    • (available at http://www.sei.cmu.edu/uls/ - last access on 19.02.07)
    • Northrop L. Ultra-large-scale system. The software challenge of the future. SEI Carnegie Mellon University Report (2006). http://www.sei.cmu.edu/uls/ (available at http://www.sei.cmu.edu/uls/ - last access on 19.02.07)
    • (2006) SEI Carnegie Mellon University Report
    • Northrop, L.1
  • 19
    • 33751100921 scopus 로고    scopus 로고
    • End-to-end trustworthy data access in data-oriented scientific computing
    • IEEE Computer Society, Los Alamitos
    • Pallickara S.L., Plale B., Fang L., and Gannon D. End-to-end trustworthy data access in data-oriented scientific computing. Proc. CCGRID'06, IEEE Proceedings (2006), IEEE Computer Society, Los Alamitos 4
    • (2006) Proc. CCGRID'06, IEEE Proceedings , pp. 4
    • Pallickara, S.L.1    Plale, B.2    Fang, L.3    Gannon, D.4
  • 21
    • 34548159019 scopus 로고    scopus 로고
    • A secure architecture for the pseudonymization of medical data
    • IEEE Computer Society, Los Alamitos
    • Riedl B., Neubauer T., and Geluch G. A secure architecture for the pseudonymization of medical data. Proc ARES'07, IEEE Proceedings (2007), IEEE Computer Society, Los Alamitos 318-324
    • (2007) Proc ARES'07, IEEE Proceedings , pp. 318-324
    • Riedl, B.1    Neubauer, T.2    Geluch, G.3
  • 22
    • 33748532138 scopus 로고    scopus 로고
    • Personalization in privacy-aware highly dynamic systems
    • ACM (9)
    • Sackman S., Struker J., and Accorsi R. Personalization in privacy-aware highly dynamic systems. Communications of the ACM vol. 49 (2006), ACM 32-38 (9)
    • (2006) Communications of the ACM , vol.49 , pp. 32-38
    • Sackman, S.1    Struker, J.2    Accorsi, R.3
  • 23
    • 33750085639 scopus 로고    scopus 로고
    • A reference model for authentication and authorisation infrastructures respecting privacy and flexibility in b2c eCommerce
    • IEEE Computer Society, Los Alamitos
    • Schlager C., Nowey T., and Montenegro J.A. A reference model for authentication and authorisation infrastructures respecting privacy and flexibility in b2c eCommerce. Proc. ARES'06, IEEE Proceedings (2006), IEEE Computer Society, Los Alamitos 709-716
    • (2006) Proc. ARES'06, IEEE Proceedings , pp. 709-716
    • Schlager, C.1    Nowey, T.2    Montenegro, J.A.3
  • 24
    • 33750931991 scopus 로고    scopus 로고
    • Provably secure anonymous access control for heterogeneous trusts
    • IEEE Computer Society, Los Alamitos
    • Shin K., and Yasuda H. Provably secure anonymous access control for heterogeneous trusts. Proc. ARES'06, IEEE Proceedings (2006), IEEE Computer Society, Los Alamitos 24-33
    • (2006) Proc. ARES'06, IEEE Proceedings , pp. 24-33
    • Shin, K.1    Yasuda, H.2
  • 27
    • 33748525490 scopus 로고    scopus 로고
    • Privacy and security in highly dynamic systems: legal programming
    • ACM (9)
    • Subirana B., and Bain M. Privacy and security in highly dynamic systems: legal programming. Communications of the ACM vol. 49 (2006), ACM 28-31 (9)
    • (2006) Communications of the ACM , vol.49 , pp. 28-31
    • Subirana, B.1    Bain, M.2
  • 29
    • 33845574135 scopus 로고    scopus 로고
    • Privacy-aware autonomous agents for pervasive healthcare
    • IEEE Computer Society
    • Tentori M., Favela J., and Rodriguez M.D. Privacy-aware autonomous agents for pervasive healthcare. IEEE Intelligent Systems vol. 21 (6) (2006), IEEE Computer Society 55-62
    • (2006) IEEE Intelligent Systems , vol.21 6 , pp. 55-62
    • Tentori, M.1    Favela, J.2    Rodriguez, M.D.3
  • 30
    • 34547652877 scopus 로고    scopus 로고
    • Securely sharing data in encrypted databases
    • IEEE Computer Society, Los Alamitos
    • Yu L., Chen G., Chen K., and Dong J. Securely sharing data in encrypted databases. Proc. CSCWD'06, IEEE Proceedings (2006), IEEE Computer Society, Los Alamitos 1-6
    • (2006) Proc. CSCWD'06, IEEE Proceedings , pp. 1-6
    • Yu, L.1    Chen, G.2    Chen, K.3    Dong, J.4
  • 31
    • 34247555884 scopus 로고    scopus 로고
    • Privacy-preserving data mining systems
    • IEEE Computer Society
    • Zhang N., and Zhao W. Privacy-preserving data mining systems. Computer vol. 40 (4) (2007), IEEE Computer Society 52-57
    • (2007) Computer , vol.40 4 , pp. 52-57
    • Zhang, N.1    Zhao, W.2
  • 32
    • 33845883003 scopus 로고    scopus 로고
    • A privacy-aware service-oriented platform for distributed data mining
    • IEEE Computer Society, Los Alamitos
    • Zhang X., Wogn H., and Cheung W.K. A privacy-aware service-oriented platform for distributed data mining. Proc. CEC/EEE'06, IEEE Proceedings (2006), IEEE Computer Society, Los Alamitos 44-47
    • (2006) Proc. CEC/EEE'06, IEEE Proceedings , pp. 44-47
    • Zhang, X.1    Wogn, H.2    Cheung, W.K.3
  • 33
    • 44949192539 scopus 로고    scopus 로고
    • Platform for Privacy Preferences (P3P) Project, W3C, http://www.w3.org/P3P/ (last access on January 2007).
    • Platform for Privacy Preferences (P3P) Project, W3C, http://www.w3.org/P3P/ (last access on January 2007).


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.