-
1
-
-
28444446666
-
Extending relational database systems to automatically enforce privacy policies
-
R. Agrawal, P. Bird, T. Grandison, J. Kiernan, S. Logan, and W. Rjaibi. Extending relational database systems to automatically enforce privacy policies. In ICDE, pages 1013-1022, 2005.
-
(2005)
ICDE
, pp. 1013-1022
-
-
Agrawal, R.1
Bird, P.2
Grandison, T.3
Kiernan, J.4
Logan, S.5
Rjaibi, W.6
-
2
-
-
0242674432
-
Hippocratic databases
-
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. Hippocratic databases. In VLDB, pages 143-154, 2002.
-
(2002)
VLDB
, pp. 143-154
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
3
-
-
33750053325
-
Privacy-preserving database systems
-
E. Bertino, J.-W. Byun, and N. Li. Privacy-preserving database systems. In FOSAD, pages 178-206, 2005.
-
(2005)
FOSAD
, pp. 178-206
-
-
Bertino, E.1
Byun, J.-W.2
Li, N.3
-
4
-
-
45749089618
-
Purpose based access control for privacy protection in relational database systems
-
J.-W. Byun and N. Li. Purpose based access control for privacy protection in relational database systems. VLDB J., 17(4):603-619, 2008.
-
(2008)
VLDB J
, vol.17
, Issue.4
, pp. 603-619
-
-
Byun, J.-W.1
Li, N.2
-
5
-
-
0013176783
-
-
Springer-Verlag New York, Inc, New York, NY, USA
-
S. Fischer-Hubner. TT-security and privacy: design and use of privacy-enhancing security mechanisms. Springer-Verlag New York, Inc, New York, NY, USA, 2001.
-
(2001)
TT-security and privacy: Design and use of privacy-enhancing security mechanisms
-
-
Fischer-Hubner, S.1
-
6
-
-
60649107731
-
-
O. for Economic Co-operation and Development. OECD guidelines on the protection of privacy and transborder flows of personal data of 1980.
-
O. for Economic Co-operation and Development. OECD guidelines on the protection of privacy and transborder flows of personal data of 1980.
-
-
-
-
7
-
-
34548016110
-
Privacy-aware role based access control
-
Q. Ni, A. Trombetta, E. Bertino, and J. Lobo. Privacy-aware role based access control. In SACMAT, pages 41-50, 2007.
-
(2007)
SACMAT
, pp. 41-50
-
-
Ni, Q.1
Trombetta, A.2
Bertino, E.3
Lobo, J.4
-
9
-
-
26444432535
-
Database privacy: Balancing confidentiality, integrity and availability
-
M. Olivier. Database privacy: Balancing confidentiality, integrity and availability. IGKDD Explorations Newsletter, 4(2):20-27, 2002.
-
(2002)
IGKDD Explorations Newsletter
, vol.4
, Issue.2
, pp. 20-27
-
-
Olivier, M.1
-
10
-
-
3142702944
-
Extending query rewriting techniques for fine-grained access control
-
S. Rizvi, A. O. Mendelzon, S. Sudarshan, and P. Roy. Extending query rewriting techniques for fine-grained access control. In SIGMOD Conference, pages 551-562, 2004.
-
(2004)
SIGMOD Conference
, pp. 551-562
-
-
Rizvi, S.1
Mendelzon, A.O.2
Sudarshan, S.3
Roy, P.4
-
11
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
12
-
-
46749089048
-
A purpose-based access control model
-
N. Yang, H. Barringer, and N. Zhang. A purpose-based access control model. In IAS, pages 143-148, 2007.
-
(2007)
IAS
, pp. 143-148
-
-
Yang, N.1
Barringer, H.2
Zhang, N.3
|