Thuraisingham et al., 1999 - Google Patents
Security and privacy issues for the World Wide Web: Panel discussionThuraisingham et al., 1999
View PDF- Document ID
- 1277096472364009186
- Author
- Thuraisingham B
- Jajodia S
- Samarati P
- Dobson J
- Olivier M
- Publication year
- Publication venue
- Database Security XII: Status and Prospects
External Links
Snippet
This is the second in a series of panels at the IFIP 11.3 Working Conference on Database and Application Security. While the first panel in 1997 focussed on data warehousing, data mining and security, the panel in 1998 focussed on web security with discussions on data …
- 238000007418 data mining 0 abstract description 7
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7844717B2 (en) | Use of proxy servers and pseudonymous transactions to maintain individual's privacy in the competitive business of maintaining personal history databases | |
US20050251865A1 (en) | Data privacy management system and method | |
Aggarwal et al. | Vision paper: Enabling privacy for the paranoids | |
Johnson et al. | Compliance with data protection laws using hippocratic database active enforcement and auditing | |
Joshi et al. | Security and privacy challenges of a digital government | |
Armando et al. | Risk-aware information disclosure | |
Xu et al. | Online anonymity for personalized web services | |
Yoose | Balancing privacy and strategic planning needs: A case study in de-identification of patron data | |
Subramanian | Computer security, privacy, and politics: current issues, challenges, and solutions | |
Thuraisingham et al. | Security and privacy issues for the World Wide Web: Panel discussion | |
Paul et al. | A possible solution for privacy preserving cloud data storage | |
Lodie et al. | Is it Personal data? Solving the gordian knot of anonymisation | |
Domingo-Ferrer et al. | Ethical value-centric cybersecurity: A methodology based on a value graph | |
Bhasin | Challenge of guarding online privacy: role of privacy seals, government regulations and technological solutions. | |
Thuraisingham et al. | SECURITY AND PRIVACY ISSUES FOR THE WORLD WIDE WEB | |
Beleuta | Data privacy and security in Business Intelligence and Analytics | |
Jain et al. | Privacy-preserving record linkage with block-chains | |
Friedrich | IBM DB2 Anonymous Resolution: Knowledge discovery without knowledge disclosure | |
Bhargav-Spantzel et al. | Privacy requirements in identity management solutions | |
Kounga et al. | Extending XACML access control architecture for allowing preference-based authorisation | |
Samarati | Notes for the panel “Privacy Issues in WWW and Data Mining” | |
Ventrella | The symbiotic relationship between privacy and security in the context of the general data protection regulation | |
Wahlstrom et al. | On the ethical and legal implications of data mining | |
Oberholzer | A privacy protection model to support personal privacy in relational databases. | |
van Heerde | Privacy-aware data management by means of data degradation-making private data less sensitive over time |