Secure Data Management

ing and Refining Authorization in SQL . . . . . . . . . . . . . . . . . . . . . . . . 148 Arnon Rosenthal and Edward Sciore A Classifier-Based Approach to User-Role Assignment for Web Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163 Shengli Sheng and Sylvia L. Osborn VIII Table of

[1]  Petra Perner,et al.  Data Mining - Concepts and Techniques , 2002, Künstliche Intell..

[2]  Pierangela Samarati,et al.  Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..

[3]  Peter Bodorik,et al.  Sociotechnical architecture for online privacy , 2005, IEEE Security & Privacy Magazine.

[4]  Bettina Berendt,et al.  E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior , 2001, EC '01.

[5]  M. Degroot,et al.  Probability and Statistics , 1977 .

[6]  Nabil R. Adam,et al.  Security-control methods for statistical databases: a comparative study , 1989, ACM Comput. Surv..

[7]  Rathindra Sarathy,et al.  A General Additive Data Perturbation Method for Database Security , 1999 .

[8]  Lance J. Hoffman,et al.  Building Privacy into the Semantic Web: An Ontology Needed Now , 2002 .

[9]  Athman Bouguettaya,et al.  Privacy on the Web: Facts, Challenges, and Solutions , 2003, IEEE Secur. Priv..

[10]  I. M. Yaglom,et al.  Geometric Transformations I , 1962 .

[11]  Christian S. Collberg,et al.  A Taxonomy of Obfuscating Transformations , 1997 .

[12]  Joydeep Ghosh,et al.  Privacy-preserving distributed clustering using generative models , 2003, Third IEEE International Conference on Data Mining.

[13]  Donna L. Hoffman,et al.  Building consumer trust online , 1999, CACM.

[14]  Catherine Blake,et al.  UCI Repository of machine learning databases , 1998 .

[15]  Asuman Dogac,et al.  A Semantic based Privacy Framework for Web Services , 2003 .