Proceedings 2004 VLDB Conference 2004
DOI: 10.1016/b978-012088469-8/50063-2
|View full text |Cite
|
Sign up to set email alerts
|

Vision PaperEnabling Privacy for the Paranoids

Abstract: P3P [23, 24] is a set of standards that allow corporations to declare their privacy policies. Hippocratic Databases [6] have been proposed to implement such policies within a corporation's datastore. From an end-user individual's point of view, both of these rest on an uncomfortable philosophy of trusting corporations to protect his/her privacy. Recent history chronicles several episodes when such trust has been willingly or accidentally violated by corporations facing bankruptcy courts, civil subpoenas or luc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
37
0

Year Published

2005
2005
2021
2021

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 23 publications
(37 citation statements)
references
References 23 publications
0
37
0
Order By: Relevance
“…Then, it sends the hashed list to data source P j so that it can compare the incoming hashed list with its own hashed list to find the common items in L i and L j . According to this scheme, in Example 1, data source P 1 In the context of data warehouses, data sources usually have more information about the secret items. For example, all data sources in Example 1 keep name, last name, phone and address information as well as SSN (Social Security Number) of a customer in their customers tables.…”
Section: Aggregated Intersectionmentioning
confidence: 99%
See 2 more Smart Citations
“…Then, it sends the hashed list to data source P j so that it can compare the incoming hashed list with its own hashed list to find the common items in L i and L j . According to this scheme, in Example 1, data source P 1 In the context of data warehouses, data sources usually have more information about the secret items. For example, all data sources in Example 1 keep name, last name, phone and address information as well as SSN (Social Security Number) of a customer in their customers tables.…”
Section: Aggregated Intersectionmentioning
confidence: 99%
“…There have been several techniques in the areas of database and cryptography for privacy preserving data sharing. One of them is to use trusted third parties such that data sources hand over their data and a third party performs the computation on their behalf [1,10]. The level of trust may not be acceptable in these methods.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Regulation of data collection for Web users is first considered by W3C through the privacy specification standard called the Platform for Privacy Preferences (P3P1.0) [5]. Subsequent research criticizes P3P because it does not guarantee Web sites have the means to implement and respect their privacy policies ( [2], [6], [8]). Social Contract Core (SCC) [10] extends P3P by allowing users to choose privacy preferences that suit them.…”
Section: Related Workmentioning
confidence: 99%
“…delete records older than 3 years) and a Policy Evaluation Engine to control user access to personally identifiable information. The Paranoid Platform for Privacy Preferences (P4P) [2] envisions a world where personal agents help individuals to control the destination, type, scope and duration of use of released personal information. Our work considers XML data collections where each query has a purpose assigned as in Hippocratic databases [4].…”
Section: Related Workmentioning
confidence: 99%