2005
DOI: 10.1007/11552338_10
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Privacy Violations in Sensitive XML Databases

Abstract: Abstract. Privacy violations and the exposition of sensitive data to a third party may seriously damage the business of a company. Therefore, it is crucial for the company to identify that set of users that may have exposed the sensitive data. To identify that set of users is a problem, when multiple users must have access rights that allow them to access the exposed sensitive data. Our solution to the problem is based on an analysis of the users' XPath queries. Within a two-step approach, we compare submitted… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2006
2006
2011
2011

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…The issue of relaxing it was later investigated in [4]. Accordingly, Stefan et al [2] detected privacy violations in sensitive XML databases and proposed an algorithm which identifies a set of suspicious XPath queries with respect to an audit XPath query. Goyal et al [7] proposed an algorithm for rewriting of queries of a specified malafide intension to detect the privacy disclosure through either explicit accesses or inferencing by functional dependencies.…”
Section: Introductionmentioning
confidence: 99%
“…The issue of relaxing it was later investigated in [4]. Accordingly, Stefan et al [2] detected privacy violations in sensitive XML databases and proposed an algorithm which identifies a set of suspicious XPath queries with respect to an audit XPath query. Goyal et al [7] proposed an algorithm for rewriting of queries of a specified malafide intension to detect the privacy disclosure through either explicit accesses or inferencing by functional dependencies.…”
Section: Introductionmentioning
confidence: 99%
“…Earlier work includes Agrawal et al [12] where a simple specification syntax and a notion of suspicion was introduced for single SQL queries in isolation, Motwani et al [13] where the authors have used a similar syntax and have proposed new suspicion notions for a batch of queries, i.e., semantic suspiciousness, strong syntactic suspiciousness, and weak syntactic suspiciousness. Other work in auditing is Böttcher et al [14] where the authors have used audit expression for XML databases and used the similar notion of suspicion as proposed by Agrawal et al in [12]. Consider the following example of an audit expression:…”
Section: Introductionmentioning
confidence: 99%