Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

Automatic Obligation Generation and Monitor System for Privacy Policy to DBMS

by Mary Treesa Thomas, Kanagaraj R., Lakshmi Vidyadharan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 114 - Number 9
Year of Publication: 2015
Authors: Mary Treesa Thomas, Kanagaraj R., Lakshmi Vidyadharan
10.5120/20003-1934

Mary Treesa Thomas, Kanagaraj R., Lakshmi Vidyadharan . Automatic Obligation Generation and Monitor System for Privacy Policy to DBMS. International Journal of Computer Applications. 114, 9 ( March 2015), 1-4. DOI=10.5120/20003-1934

@article{ 10.5120/20003-1934,
author = { Mary Treesa Thomas, Kanagaraj R., Lakshmi Vidyadharan },
title = { Automatic Obligation Generation and Monitor System for Privacy Policy to DBMS },
journal = { International Journal of Computer Applications },
issue_date = { March 2015 },
volume = { 114 },
number = { 9 },
month = { March },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume114/number9/20003-1934/ },
doi = { 10.5120/20003-1934 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:52:13.617872+05:30
%A Mary Treesa Thomas
%A Kanagaraj R.
%A Lakshmi Vidyadharan
%T Automatic Obligation Generation and Monitor System for Privacy Policy to DBMS
%J International Journal of Computer Applications
%@ 0975-8887
%V 114
%N 9
%P 1-4
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data stored in the database includes personnel and sensitive data. Privacy policies in the database management system can control collection, access and disclosure of data. Policies are used to specify obligation. Obligation is certain actions or condition which has to be satisfied for accessing data. The main objective this project is to enable a monitor for implementing privacy policies which specifies obligations. Based on the obligations monitor can control the SQL code execution. The approach is automated, systematic and can work with most of the relational DBMS.

References
  1. Bettini. C, Jajodia. S,Wang, and Wijesekera,(2013) "Provisions and Obligations in Policy Rule Management," J. Network and Systems Management, vol. 11, no. 3, pp. 351-372.
  2. Byun and N. Li. N,(2008) "Purpose Based Access Control for Privacy Protection in Relational Database Systems," The Int'l J. Very Large Data Bases, vol. 17, no. 4, pp. 603-619.
  3. Colombo and Ferrari. E, "Enforcement of Purpose Based Access Control within Relational Database Management Systems," IEEE Transaction on Knowledge and Data Eng. (IEEE TKDE), to appear.
  4. Colombo. Pand Ferrari. E, (2012)"Towards a Framework to Handle Privacy Since the Early Phases of the Development: Strategies and Open Challenges," Proc. IEEE Sixth Int'l Conf. Digital Ecosystems Technologies (DEST).
  5. Colombo and Ferrari,(2012) "Towards a Modeling and Analysis Framework for Privacy-Aware Systems," Proc. Int'l Conf. Privacy, Security, Risk and Trust and Int'l Conf. Social Computing (PASSAT).
  6. France and Rumpe,(2007) "Model-Driven Development of Complex Software: A Research Roadmap," Proc. Future of Software Eng. (FOSE).
  7. Gama. P, C. Ribeiro, and P. Ferreira, (2006)"Heimdhal: A History-Based Policy Engine for Grids," Proc. IEEE Sixth Int'l Symp. Cluster Computing and the Grid (CCGRID).
  8. Hilty. M,Basin, and A. Pretschner,(2005) "On Obligations," Proc. European Symp. Research in Computer Security (ESORICS '05), pp. 98-117.
  9. Irwin. K, T. Yu, and W. H. Wins borough,(2006) "On the Modeling and Analysis of Obligations," Proc. 13th ACM Conf. Computer and Comm. Security (CCS).
  10. Jafari. M, P. Fong, R. Safavi Naini, and K. Barker,(2013) A Framework for Expressing and Enforcing Purpose-Based Privacy Policies.
  11. Katt, Zhang, R. Breu, M. Hafner, and J. -P. Seifert, (2008)"A General Obligation Model and Continuity: Enhanced Policy Enforcement Engine for Usage Control," Proc. 13th ACM Symp. Access Control Models and Technologies (SACMAT).
  12. Kiczales, Lamping, Mendhekar, Maeda, Lopes. J. ,Loingtier, and Irwin,(1997) "Aspect-Oriented Programming," Proc. European Conf. Object-Oriented Programming (ECOOP '97), pp. 220- 242.
Index Terms

Computer Science
Information Sciences

Keywords

Obligations Privacy policies Relational database management system