Database security-concepts, approaches, and challenges

E Bertino, R Sandhu - IEEE Transactions on Dependable and …, 2005 - ieeexplore.ieee.org
As organizations increase their reliance on, possibly distributed, information systems for
daily business, they become more vulnerable to security breaches even as they gain …

Security and privacy aspects in MapReduce on clouds: A survey

P Derbeko, S Dolev, E Gudes, S Sharma - Computer science review, 2016 - Elsevier
MapReduce is a programming system for distributed processing of large-scale data in an
efficient and fault tolerant manner on a private, public, or hybrid cloud. MapReduce is …

Database meets artificial intelligence: A survey

X Zhou, C Chai, G Li, J Sun - IEEE Transactions on Knowledge …, 2020 - ieeexplore.ieee.org
Database and Artificial Intelligence (AI) can benefit from each other. On one hand, AI can
make database more intelligent (AI4DB). For example, traditional empirical database …

Purpose based access control of complex data for privacy protection

JW Byun, E Bertino, N Li - Proceedings of the tenth ACM symposium on …, 2005 - dl.acm.org
As privacy becomes a major concern for both consumers and enterprises, many research
efforts have been devoted to the development of privacy protecting technology. We recently …

Big data security and privacy

E Bertino, E Ferrari - A comprehensive guide through the Italian database …, 2017 - Springer
Recent technologies, such as IoT, social networks, cloud computing, and data analytics,
make today possible to collect huge amounts of data. However, for data to be used to their …

Privacy-aware role-based access control

Q Ni, E Bertino, J Lobo, C Brodie, CM Karat… - ACM Transactions on …, 2010 - dl.acm.org
In this article, we introduce a comprehensive framework supporting a privacy-aware access
control mechanism, that is, a mechanism tailored to enforce access control to data …

[PDF][PDF] The cyber security body of knowledge

D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …

On purpose and by necessity: compliance under the GDPR

D Basin, S Debois, T Hildebrandt - … , Curaçao, February 26–March 2, 2018 …, 2018 - Springer
Abstract The European General Data Protection Regulation (GDPR) gives primacy to
purpose: Data may be collected and stored only when (i) end-users have consented, often …

[HTML][HTML] Patient consent management by a purpose-based consent model for electronic health record based on blockchain technology

D Tith, JS Lee, H Suzuki… - Healthcare …, 2020 - synapse.koreamed.org
Objectives Currently, patients' consent is essential to use their medical records for various
purposes; however, most people give their consent using paper forms and have no control …

Privacy aware access control for big data: A research roadmap

P Colombo, E Ferrari - Big Data Research, 2015 - Elsevier
Big Data is an emerging phenomenon that is rapidly changing business models and work
styles [1]. Big Data platforms allow the storage and analysis of high volumes of data with …