21st International Conference on Data Engineering (ICDE'05)
DOI: 10.1109/icde.2005.64
|View full text |Cite
|
Sign up to set email alerts
|

Extending Relational Database Systems to Automatically Enforce Privacy Policies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
66
0
2

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 90 publications
(68 citation statements)
references
References 3 publications
0
66
0
2
Order By: Relevance
“…The models in [1,18] support only row-level constraints, those in [7,12] support only column-level constraints, and the model in [5] supports both. Our security policy model subsumes all these approaches as well as approaches where the security policy is expressed using views.…”
Section: Security Policy Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…The models in [1,18] support only row-level constraints, those in [7,12] support only column-level constraints, and the model in [5] supports both. Our security policy model subsumes all these approaches as well as approaches where the security policy is expressed using views.…”
Section: Security Policy Modelmentioning
confidence: 99%
“…There is, however, no common terminology to refer to the problem of computing answers to queries in the presence of access control policies. For example, "secure querying" [9], "enforcing data confidentiality" [15], and "Fine-Grained Access Control" [5,16,19] have all been used in this context. In the following, we refer to this problem as Security-Aware Query Processing (SAQP).…”
Section: Introductionmentioning
confidence: 99%
“…The structure of this paper 1 is as follows: section II recalls some basics on Abstract Interpretation theory and on the concrete and abstract semantics of database query languages. We describe the proposed OFGAC 1 The paper is a revised and extended version of [10,12] framework to the context of RDBMS and XML documents in sections III and IV respectively. In section V, we discuss the related works in the literature.…”
Section: Figure 1: a Document Type Definition (Dtd) And Its Instancementioning
confidence: 99%
“…They presented a formal model of secret information disclosure that defines a query to be suspicious if and only if the disclosed secret could be inferred from its answer. Agrawal et al [1] introduced the syntax of a fine grained restriction command at column level, row level, or cell level. The enforcement algorithm automatically combines the restrictions relevant to individual queries annotated with purpose and recipient information, and transforms the users' queries into equivalent queries over a dynamic view that implements the restriction.…”
Section: Related Workmentioning
confidence: 99%
“…Subsequent works have proposed solutions for implementing HDBs. In [1], authors address the problem of how current relational DBMS can be transformed into their privacy-preserving equivalents. From specifications of privacy policies, they propose an algorithm that defines restrictions (on columns, rows, and cells) to limit data access.…”
Section: Hippocratic Databasesmentioning
confidence: 99%