{"title":"Hippocratic Database: A Privacy-Aware Database","authors":"Norjihan Abdul Ghani, Zailani Mohd Sidek","volume":18,"journal":"International Journal of Computer and Information Engineering","pagesStart":1965,"pagesEnd":1970,"ISSN":"1307-6892","URL":"https:\/\/publications.waset.org\/pdf\/9597","abstract":"
Nowadays, organizations and business has several motivating factors to protect an individual-s privacy. Confidentiality refers to type of sharing information to third parties. This is always referring to private information, especially for personal information that usually needs to keep as a private. Because of the important of privacy concerns today, we need to design a database system that suits with privacy. Agrawal et. al. has introduced Hippocratic Database also we refer here as a privacy-aware database. This paper will explain how HD can be a future trend for web-based application to enhance their privacy level of trustworthiness among internet users.<\/p>\r\n","references":"[1] J. H. Moor. \"Towards a Theory of Privacy for the Information Age\".\r\nComputers and Society, 27(3):27-32, 1997.\r\n[2] Elisa Bertino, and Ravi Sandhu, \"Database Security\u00d4\u00c7\u00f6Concepts,\r\nApproaches, and Challenges\", IEEE Transactions on Dependable and\r\nSecure Computing, Vol. 2, No. 1, January-March 2005, pp 2 - 19.\r\n[3] Sabah S. Al-Fedaghi, \"Privacy as a base for Confidentiality\". Presented\r\nin the Fourth Workshop on the Economics of Information Security,\r\nHarvard University, Cambridge, MA, 2005.\r\n[4] Csilla Farkas, Sushil Jajodia. \"The Inference Problem : A Survey\".\r\nSIGKDD Explorations, Volume 4, issues 2, pp 6-11.\r\n[5] N. R. Adam & J. C. Wortman. \"Security-control methods for Statistical\r\nDatabases\". ACM Computing Surveys, 21(4):515 - 556, Dec 1989.\r\n[6] A. Shoshani. \"Statistical Databases : Characterictics, Problems and\r\nSome Solutions\". In Proc. of the Eighth International\r\nConference on Very large Databases, pages 208 -213, Mexico,\r\nSeptember 1982.\r\n[7] R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. Hippocratic databases. In\r\nThe 28th International Conference on Very Large Databases (VLDB),\r\n2002.\r\n[8] Clarke, R. 1999. Introduction to Dataveillance and Information Privacy,\r\nand Definitions and Terms.[Online] Available :\r\nhttp:\/\/www.anu.edu.au\/people\/Roger.Clarke\/DV\/Intro.html#Priv\r\n[9] Goldberg, I., Wagner, D., Brewer, E. \"Privacy-Enhancing Technologies\r\nfor the Internet\". Proceedings of IEEE COMPCON \u00d4\u00c7\u00ff97, 1997, 103 -\r\n109.\r\n[10] Marx, G. T., 2001. \"Identity and Anonimity: Some Conceptual\r\nDistinctions and Issues for Research\", In J. Caplan and J. Torpey,\r\nDocumenting Individual Identity (Princeton University Press, 2001)\r\n[11] Ji-Won Byun, Ninghui, \"Purpose Based Access Control for Privacy\r\nprotection in relational Database Systems\". The VLDB Journal, 2006.\r\n[12] (Book Chapter) Sabrina De Capitani di Vimercati, Sarah Foresti,\r\nPierangela Samarati, \"Authorization and Access Control\". Privacy &\r\nTrust in Modern Data Management.\r\n[13] Silcana Castano, Mariagrazia Fugini, Giancarlo Martella, Peirangela\r\nSamaranti, \"Database Security\", Addison Wesley1994.","publisher":"World Academy of Science, Engineering and Technology","index":"Open Science Index 18, 2008"}