Precomputation of privacy policy parameters for auditing SQL queries
暂无分享,去创建一个
[1] Donald K. Burleson,et al. Oracle privacy secutiry auditing : includes Federal Law compliance with HIPAA, Sarbanes-Oxley & the Gramm-Leach-Bliley Act GLB , 2003 .
[2] Ramakrishnan Srikant,et al. Hippocratic Databases , 2002, VLDB.
[3] Fay Cobb Payton,et al. Privacy of medical records: IT implications of HIPAA , 2000, CSOC.
[4] Rajanish Dass,et al. Privacy Violation and Detection Using Pattern Mining Techniques , 2005 .
[5] Andreas Matheus,et al. How to Declare Access Control Policies for XML Structured Information Objects using OASIS' eXtensible Access Control Markup Language (XACML) , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[6] Elisa Bertino,et al. Privacy Protection , 2022 .
[7] Emilie Lundin Barse. Logging for Intrusion and Fraud Detection , 2004 .
[8] Silvana Castano,et al. Database Security , 1997, IFIP Advances in Information and Communication Technology.
[9] Holt Lh,et al. Privacy of medical records. , 1980, The Record of the Association of the Bar of the City of New York.
[10] Vikram Goyal,et al. Query rewriting for detection of privacy violation through inferencing , 2006, PST.
[11] David J. DeWitt,et al. Limiting Disclosure in Hippocratic Databases , 2004, VLDB.
[12] Sushil Jajodia,et al. Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures , 2000, IEEE Trans. Knowl. Data Eng..
[13] Paul Ashley,et al. E-P3P privacy policies and privacy authorization , 2002, WPES '02.
[14] David J. Danelski,et al. Privacy and Freedom , 1968 .
[15] Christos Faloutsos,et al. Auditing Compliance with a Hippocratic Database , 2004, VLDB.
[16] Anne H. Anderson,et al. A comparison of two privacy policy languages: EPAL and XACML , 2006, SWS '06.
[17] Anand Gupta,et al. Design and Development of Malafide Intension Based Privacy Violation Detection System (An Ongoing Research Report) , 2006, ICISS.
[18] Sushil Jajodia,et al. Secure databases: constraints and inference channels , 2000 .
[19] Farzad Salim,et al. Detecting and Resolving Redundancies in EP3P Policies , 2006 .
[20] Jaideep Vaidya,et al. Privacy-preserving indexing of documents on the network , 2003, The VLDB Journal.