Hippocratic Databases, 28th International Conference on Very Large Databases, pp.143-154, 2002. ,
DOI : 10.1016/B978-155860869-6/50021-4
Extending Relational Database Systems to Automatically Enforce Privacy Policies, 21st International Conference on Data Engineering (ICDE'05), pp.1013-1022, 2005. ,
DOI : 10.1109/ICDE.2005.64
Beyond Purpose-based privacy access control, 18th Australian Database Conference, pp.23-32, 2007. ,
Flexible access control policy specification with constraint logic programming, ACM Transactions on Information and System Security, vol.6, issue.4, pp.501-546, 2003. ,
DOI : 10.1145/950191.950194
Data-base security: Research and practice. Information systems, pp.537-556, 1995. ,
Purpose based access control of complex data for privacy protection, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, pp.102-110, 2005. ,
DOI : 10.1145/1063979.1063998
Purpose based access control for privacy protection in relational database systems, The VLDB Journal, vol.29, issue.2, pp.603-619, 2008. ,
DOI : 10.1007/s00778-006-0023-0
The SeaView security model, Proceedings. 1988 IEEE Symposium on Security and Privacy, pp.218-233, 1988. ,
DOI : 10.1109/SECPRI.1988.8114
Privacy concerns cost e-commerce $15 billion, 2001. ,
Conditional Purpose Based Access Control Model for Privacy Protection, 20th Australisian Database Conference, pp.137-144, 2009. ,
Disclosure in Hippocratic databases, 30th International Conference on Very Large Databases, pp.108-119, 2004. ,
The platform for privacy preferences 1.0 (P3P1.0) specification, p.3, 2002. ,
Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation, 10th Europran Symposium on Research in Computer Security, pp.438-454, 2005. ,
DOI : 10.1007/11555827_25
Extending query rewriting techniques for fine-grained access control, Proceedings of the 2004 ACM SIGMOD international conference on Management of data , SIGMOD '04, pp.551-562, 2004. ,
DOI : 10.1145/1007568.1007631
Privacy promises, access control, and privacy management, 3rd International Symposium on Electronic Commerce, pp.13-21, 2002. ,
Toward a multilevel secure relational data model, ACM Transactional Conference on Management of Data, pp.50-59, 1991. ,
Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996. ,
DOI : 10.1109/2.485845
The multilevel relational (MLR) data model, ACM Transactions on Information and System Security, vol.1, issue.1, pp.93-132, 1998. ,
DOI : 10.1145/290163.290171
A Purpose-Based Access Control Model, 3rd International Symposium on Information Assurance and Security, pp.143-148, 2007. ,
Dynamic Purpose-Based Access Control, 2008 IEEE International Symposium on Parallel and Distributed Processing with Applications, pp.695-700, 2008. ,
DOI : 10.1109/ISPA.2008.80
Towards a Privacy Access Control Model for e-Healthcare Services, Third Annual Conference on Privacy, Security and Trust, 2005. ,