CFP last date
20 May 2024
Reseach Article

New Challenge for Hippocratic Database- Limited Disclosure

by Pooja Sapra, Minakshi Memoria, Sunaina
journal cover thumbnail
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 16
Year of Publication: 2010
Authors: Pooja Sapra, Minakshi Memoria, Sunaina
10.5120/336-507

Pooja Sapra, Minakshi Memoria, Sunaina . New Challenge for Hippocratic Database- Limited Disclosure. International Journal of Computer Applications. 1, 16 ( February 2010), 84-86. DOI=10.5120/336-507

@article{ 10.5120/336-507,
author = { Pooja Sapra, Minakshi Memoria, Sunaina },
title = { New Challenge for Hippocratic Database- Limited Disclosure },
journal = { International Journal of Computer Applications },
issue_date = { February 2010 },
volume = { 1 },
number = { 16 },
month = { February },
year = { 2010 },
issn = { 0975-8887 },
pages = { 84-86 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume1/number16/336-507/ },
doi = { 10.5120/336-507 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:42:47.873500+05:30
%A Pooja Sapra
%A Minakshi Memoria
%A Sunaina
%T New Challenge for Hippocratic Database- Limited Disclosure
%J International Journal of Computer Applications
%@ 0975-8887
%V 1
%N 16
%P 84-86
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the exponential growth in data collection and number of users, the privacy preservation becomes the major issue in design and implement of various database system. Today the basic privacy solution is considered to be Hippocratic database. Our major concern is to get the solution of problems in LD of Hippocratic database. Hence we will formulate the basic privacy laws.

References
  1. D. Banisar. Privacy and human rights. Electronic Privacy Information Center, 2000.
  2. C.J.Bennett. Regulating Privacy: Data Protection and Public Policy in Europe and the United States.Cornell Univ Press, 1992 Business Week. Privacy on the Net, March 2000.
  3. S. Castano, M. Fugini, G. Martella, and P. Samarati. Database Security. Addison Wesley, 1995.
  4. S. Jajodia and R. Sandhu. Polyinstantiation integrity in multilevel relations. In IEEE Symp. on Security and Privacy, 1990.
  5. S. Katzenbeisser and F. A. Petitcolas, editors. Information Hiding Techniques for Steganography andDigital Watermarking. Artech House, 2000.
  6. L. Lessig. Code and Other Laws of Cyberspace.Basic Books, 1999.
  7. T. F. Lunt. A Survey of Intrusion Detection Techniques. Computers & Security, 12(4):405–418, 1993.
  8. Office of the Information and Privacy Commissioner, Ontario. Data Mining: Staking a Claim on Your Privacy, January 1998.
  9. R. Ramakrishnan and J. Gehrke. Database Management Systems. McGraw-Hill, 2000.
  10. M. Rotenberg. The Privacy Law Sourcebook 2000: UnitedStates Law, International Law, and Recent Developments. Electronic Privacy Information Center ,2000.
  11. A. Silberschatz, H. F. Korth, and S. Sudarshan. Database Systems Concepts. McGraw-Hill, 3rd edition, 1997.
  12. P. Stachour and B. Thuraisingham. Design of LDV: A multilevel secure relational database management system. IEEE Trans. Knowledge and Data Eng., 2(2):190–209, 1990.
  13. J. D. Ullman. Principles of Database & Knowledge Base Systems, volume 1. Computer Science Press,1988.
  14. J. D. Ullman. Principles of Database & Knowledge- Base Systems, volume 2: The New Technologies Computer Science Press, 1989.
  15. N. R. Wagner. Fingerprinting. In IEEE Symp. on Seurity and privacy, pages 18–22, Oakland, California, April 1983.
  16. M. Rotenberg. Fair information practices and the architecture of privacy. Stanford Technology Law Review, 1, 2001.
  17. U.S. Department of Health, Education, and Welfare.Records,computers and the Rights of Citizen: Reportof the Secretary’s Advisory Committee on AutomatedPersonal Data Systems, xx-xxiii edition, 1973.
Index Terms

Computer Science
Information Sciences

Keywords

Privacy Ontology Hippocracy Limited Disclosure