Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human 2009
DOI: 10.1145/1655925.1656186
|View full text |Cite
|
Sign up to set email alerts
|

Employing PRBAC for privacy preserving data publishing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2011
2011
2011
2011

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…Dafa-Alla et al [18] employed PRBAC in order to protect sensitive information while different users are working in sessions according to their roles with variable privileges. Such control of sensitivity is dependent upon relational format.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Dafa-Alla et al [18] employed PRBAC in order to protect sensitive information while different users are working in sessions according to their roles with variable privileges. Such control of sensitivity is dependent upon relational format.…”
Section: Literature Reviewmentioning
confidence: 99%
“…This technique has five components such as rule miner, result recommender, query miner, query re-commender and querier [29]. The ultimate goal of this technique is to provide the best query for the user amongst the frequently asked ones but remains silent about security risks involvement as suggested by Dafa-Alla et al [18]. Furthermore, Wang et al [30] suggested SDST (Standard Data Source Template) for mining XML file.…”
Section: Literature Reviewmentioning
confidence: 99%