Database Reference
In-Depth Information
Park, J., & Sandhu, R. (2004). The ucon-
abc usage control model. ACM Transactions
on Information Security , 7 (1), 128-174.
doi:10.1145/984334.984339
Sandhu, R. S., Ferraiolo, D., & Kuhn, R. (2000,
July). The nist model for role-based access control:
Towards a unified standard. In Proc. of 5th ACM
Workshop on Role-Based Access Control , Berlin,
Germany: ACM Press.
Priebe, T., & Pernul, G. (2004). Sicherheit in
Data-Warehouse- und OLAP-Systemen. Rund-
brief der Fachgruppe Modellierung betrieblicher
Informationssysteme (MobIS) der Gesellschaft für
Informatik e.V. (GI) .
Sweeney, L. (2002). k-anonymity: a model
for protecting privacy. International Journal
on Uncertainty, Fuzziness and Knowledge-
based Systems , 10 (5), 557-570. doi:10.1142/
S0218488502001648
Samarati, P., & Sweeney, L. (1998). Protecting pri-
vacy when disclosing information: k-anonymity
and its through generalization and suppression. In
Proceedings of the IEEE Symposium on Research
in Security and Privacy .
Thuraisingham, B. (2005). Privacy constraint
processing in a privacy-enhanced database man-
agement system. Data & Knowledge Engineering ,
55 , 159-188. doi:10.1016/j.datak.2005.03.001
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., &
Youman, C. E. (1996, February). Role-based
access control models. IEEE Computer , 29 (2),
38-47.
Willenborg, L., & De Waal, T. (1996). Statistical
disclosure control in practice . Berlin: Springer-
Verlag.
Search WWH ::




Custom Search