-
1
-
-
54249130328
-
Recording Provenance for SQL Queries and Updates
-
Vansummeren, S., Cheney, J.: Recording Provenance for SQL Queries and Updates. IEEE Data Eng. Bull 30(4), 29-37 (2007)
-
(2007)
IEEE Data Eng. Bull
, vol.30
, Issue.4
, pp. 29-37
-
-
Vansummeren, S.1
Cheney, J.2
-
2
-
-
33846678309
-
Enabling the 21st century health care information technology revolution
-
Agrawal, R., Grandison, T., Johnson, C., Kiernan, J.: Enabling the 21st century health care information technology revolution. Commun. ACM 50(2), 34-42 (2007)
-
(2007)
Commun. ACM
, vol.50
, Issue.2
, pp. 34-42
-
-
Agrawal, R.1
Grandison, T.2
Johnson, C.3
Kiernan, J.4
-
3
-
-
77954321643
-
-
Anderson, H.: A comparison of two privacy policy languages: EPAL and XACML. In: SWS 2006, pp. 53-60. ACM Press, New York (2006)
-
Anderson, H.: A comparison of two privacy policy languages: EPAL and XACML. In: SWS 2006, pp. 53-60. ACM Press, New York (2006)
-
-
-
-
4
-
-
34547332566
-
A roadmap for comprehensive online privacy policy management
-
Antón, I., Bertino, E., Li, N., Yu, T.: A roadmap for comprehensive online privacy policy management. Commun. ACM 50(7), 109-116 (2007)
-
(2007)
Commun. ACM
, vol.50
, Issue.7
, pp. 109-116
-
-
Antón, I.1
Bertino, E.2
Li, N.3
Yu, T.4
-
5
-
-
19944380112
-
Database security-concepts, approaches, and challenges
-
Bertino, E., Sandhu, R.: Database security-concepts, approaches, and challenges. IEEE Transactions on Dependable and Secure Computing 02(1), 2-19 (2005)
-
(2005)
IEEE Transactions on Dependable and Secure Computing 02(1)
, pp. 2-19
-
-
Bertino, E.1
Sandhu, R.2
-
6
-
-
84990975367
-
PRIVATE-IYE: A framework for privacy preserving data integration. In: ICDEW
-
Los Alamitos
-
Bhowmick, S.S., Gruenwald, L., Iwaihara, M., Chatvichienchai, S.: PRIVATE-IYE: A framework for privacy preserving data integration. In: ICDEW 2006, p. 91. IEEE, Los Alamitos (2006)
-
(2006)
91. IEEE
, pp. 2006
-
-
Bhowmick, S.S.1
Gruenwald, L.2
Iwaihara, M.3
Chatvichienchai, S.4
-
7
-
-
34748816024
-
-
Clifton, C., Kantarcioǧlu, M., Doan, A., Schadow, G., Vaidya, J., Elmagarmid, A., Suciu, D.: Privacy-preserving data integration and sharing. In: DMKD 2004, pp. 19-26. ACM Press, New York (2004)
-
Clifton, C., Kantarcioǧlu, M., Doan, A., Schadow, G., Vaidya, J., Elmagarmid, A., Suciu, D.: Privacy-preserving data integration and sharing. In: DMKD 2004, pp. 19-26. ACM Press, New York (2004)
-
-
-
-
8
-
-
0038546767
-
Lineage tracing for general data warehouse transformations
-
Cui, Y., Widom, J.: Lineage tracing for general data warehouse transformations. The VLDB Journal 12(1), 471-480 (2003)
-
(2003)
The VLDB Journal
, vol.12
, Issue.1
, pp. 471-480
-
-
Cui, Y.1
Widom, J.2
-
9
-
-
34248181923
-
l-diversity: Privacy beyond k-anonymity
-
Machanavajjhala, J., Gehrke, D.K., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1(1), 1556-4681 (2007)
-
(2007)
ACM Trans. Knowl. Discov. Data
, vol.1
, Issue.1
, pp. 1556-4681
-
-
Machanavajjhala, J.1
Gehrke, D.K.2
Venkitasubramaniam, M.3
-
10
-
-
34548016110
-
-
Ni, Q., Trombetta, A., Bertino, E., Lobo, J.: Privacy-aware role based access control. In: SACMAT 2007, pp. 41-50. ACM Press, New York (2007)
-
Ni, Q., Trombetta, A., Bertino, E., Lobo, J.: Privacy-aware role based access control. In: SACMAT 2007, pp. 41-50. ACM Press, New York (2007)
-
-
-
-
11
-
-
34547643009
-
-
Rizzi, S., Abelló, A., Lechtenbörger, J., Trujillo, J.: Research in data warehouse modeling and design: dead or alive? In: DOLAP 2006, pp. 3-10. ACM Press, New York (2006)
-
Rizzi, S., Abelló, A., Lechtenbörger, J., Trujillo, J.: Research in data warehouse modeling and design: dead or alive? In: DOLAP 2006, pp. 3-10. ACM Press, New York (2006)
-
-
-
-
12
-
-
0036811143
-
Achieving k-anonymity privacy protection using generalization and suppression
-
Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Fuzziness Knowl. -Based Syst. 10(5), 571-588 (2002)
-
(2002)
Int. J. Uncertain. Fuzziness Knowl. -Based Syst
, vol.10
, Issue.5
, pp. 571-588
-
-
Sweeney, L.1
-
13
-
-
11844281385
-
State-of-the-art in privacy preserving data mining
-
Verykios, V.S., Bertino, E., Fovino, I.N., Provenza, L.P., Saygin, Y., Theodoridis, Y.: State-of-the-art in privacy preserving data mining. SIGMOD Rec. 33(1), 50-57 (2004)
-
(2004)
SIGMOD Rec
, vol.33
, Issue.1
, pp. 50-57
-
-
Verykios, V.S.1
Bertino, E.2
Fovino, I.N.3
Provenza, L.P.4
Saygin, Y.5
Theodoridis, Y.6
-
14
-
-
3543091604
-
Securing OLAP data cubes against privacy breaches
-
IEEE, Los Alamitos
-
Wang, L., Jajodia, S., Wijesekera, D.: Securing OLAP data cubes against privacy breaches. In: IEEE Symposium on Security and Privacy, pp. 161-175. IEEE, Los Alamitos (2004)
-
(2004)
IEEE Symposium on Security and Privacy
, pp. 161-175
-
-
Wang, L.1
Jajodia, S.2
Wijesekera, D.3
-
15
-
-
84858835658
-
Trio: A system for integrated management of data, accuracy, and lineage
-
Widom, J.: Trio: A system for integrated management of data, accuracy, and lineage. In: CIDR 2005, pp. 262-276 (2005)
-
(2005)
CIDR 2005
, pp. 262-276
-
-
Widom, J.1
-
17
-
-
33745593742
-
Research Problems in Data Provenance
-
Tan, W.: Research Problems in Data Provenance. IEEE Data Engineering Bulletin 27(4), 45-52 (2004)
-
(2004)
IEEE Data Engineering Bulletin
, vol.27
, Issue.4
, pp. 45-52
-
-
Tan, W.1
-
18
-
-
38949179575
-
-
IAT
-
Dehousse, S., Liu, L., Faulkner, S., Kolp, M., Mouratidis, H.: Modeling Delegation through an i*-based Approach. In: IAT 2006, pp. 393-397 (2006)
-
(2006)
Modeling Delegation through an i*-based Approach
, pp. 393-397
-
-
Dehousse, S.1
Liu, L.2
Faulkner, S.3
Kolp, M.4
Mouratidis, H.5
-
19
-
-
29844439290
-
DBNotes: A post-it system for relational databases based on provenance
-
Chiticariu, L., Tan, W.C., Vijayvargiya, G.: DBNotes: a post-it system for relational databases based on provenance. In: SIGMOD 2005, pp. 942-944 (2005)
-
(2005)
SIGMOD 2005
, pp. 942-944
-
-
Chiticariu, L.1
Tan, W.C.2
Vijayvargiya, G.3
-
20
-
-
33745600555
-
-
Geerts, F., Kementsietsidis, A., Milano, D.: iMONDRIAN: A Visual Tool to Annotate and Query Scientific Databases. In: Ioannidis, Y., Scholl, M.H., Schmidt, J.W., Matthes, F., Hatzopoulos, M., Böhm, K., Kemper, A., Grust, T., Böhm, C. (eds.) EDBT 2006. LNCS, 3896, pp. 1168-1171. Springer, Heidelberg (2006)
-
Geerts, F., Kementsietsidis, A., Milano, D.: iMONDRIAN: A Visual Tool to Annotate and Query Scientific Databases. In: Ioannidis, Y., Scholl, M.H., Schmidt, J.W., Matthes, F., Hatzopoulos, M., Böhm, K., Kemper, A., Grust, T., Böhm, C. (eds.) EDBT 2006. LNCS, vol. 3896, pp. 1168-1171. Springer, Heidelberg (2006)
-
-
-
-
21
-
-
35148840335
-
Intensional associations between data and metadata
-
Srivastava, D., Velegrakis, Y.: Intensional associations between data and metadata. In: SIGMOD 2007, pp. 401-412 (2007)
-
(2007)
SIGMOD 2007
, pp. 401-412
-
-
Srivastava, D.1
Velegrakis, Y.2
-
22
-
-
54249149914
-
-
Italian's Data Protection Code, DL n. 196/30 (June 2003)
-
Italian's Data Protection Code, DL n. 196/30 (June 2003)
-
-
-
-
23
-
-
54249112843
-
-
European Directive 1995/46/EC, OJ L 281, p. 31 of 23.11.1995
-
European Directive 1995/46/EC, OJ L 281, p. 31 of 23.11.1995
-
-
-
|