Advertisement

Towards Automated Privacy Compliance in the Information Life Cycle

  • Rema Ananthanarayanan
  • Ajay Gupta
  • Mukesh Mohania
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4891)

Abstract

Management of data is an increasingly challenging task for enterprises because of the increasingly diverse and complex requirements that come to bear from various fronts. One issue is the protection of the privacy of the information held, while ensuring compliance with various rules and regulations relating to data management.One issue is the protection of the privacy of the information held, while ensuring compliance with various rules and regulations relating to data management. Privacy may be defined as the claim of individuals, groups and institutions to determine for themselves when, how and to what extent information about them is communicated to others. In its broadest scope this is a problem that has challenged civil rights advocates the world over, at different times.

Keywords

Rule Association Data Item Privacy Policy Privacy Protection User Request 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Agrawal, R., Kieman, J., Xu, R.Y.: Hippocratic databases. In: Proceedings of the 28th VLDB Conference (2002)Google Scholar
  2. 2.
    Cranor, L.F., Ackerman, M.S.: Beyond concern: Understanding the net user’s attitude about online privacy. Technical report TR 99.4.3, AT&T Labs Research (1999)Google Scholar
  3. 3.
    Westin, A.F.: How the public views health privacy: Survey findings from (1978–2005), http://www.pandab.org/HealthSrvyRpt.pdf
  4. 4.
    Records, computers and the rights of citizens: report of the secretary’s advisory committee on automated personal data systems (1973), http://wwwGoogle Scholar
  5. 5.
    Oecd guidelines on the protection of privacy and transborder flows of personal data (1980), http://www.oecd.org
  6. 6.
    Xacml 2.0 specification set, http://www.oasis-open.org/committees/xacml/
  7. 7.
    Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models, vol. 29(2), pp. 38–47 (1996)Google Scholar
  8. 8.
    Agrawal, R., Bird, P., Grandison, T., Kiernan, J., Logan, S., Rjaibi, W.: Extending relational database systems to automatically enforce privacy policies. In: 21st International Conference on Data Engineering (ICDE 2005), pp. 1013–1022 (2005)Google Scholar
  9. 9.
    Park, J., Sandhu, R.: Towards usage control models: Beyond traditional access control. In: Proceedings of the 7th Symposium on Access Control Models and Technologies (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Rema Ananthanarayanan
    • 1
  • Ajay Gupta
    • 1
  • Mukesh Mohania
    • 1
  1. 1.IBM India Research LabNew DelhiIndia

Personalised recommendations