Data Integration Systems (DIS) are concerned with integrating data from multiple data sources to resolve user queries. Typically, organisations providing data sources specify security policies that impose stringent requirements on the collection, processing, and disclosure of personal and sensitive data. If the security policies were not correctly enforced by the integration component of DIS, the data is exposed to data leakage threats, e.g. unauthorised disclosure or secondary use of the data. SecureDIS is a framework that helps system designers to mitigate data leakage threats during the early phases of DIS development. SecureDIS provides designers with a set of informal guidelines written in natural language to specify and enforce securi...
Mediation techniques support integrated query processing among heterogeneous databases. While such...
What is the best way of managing access to sensitive data? This is not a straightforward question, a...
© 2020 Elsevier Inc. While databases provide capabilities to enforce security and privacy policies, ...
As the web moves increasingly towards publishing data, a significant challenge arises when integrati...
In this paper, we apply a formal approach to model a DIS with the SecureDIS security policies and ve...
With the web witnessing an immense shift towards publishing data, integrating data from diverse sour...
International audienceThis paper presents a well-founded language allowing in one hand data owners t...
Abstract — In the context of Data Integration Systems (DIS), integrating data across organizations v...
Security in software applications is frequently an afterthought. Even if developers are aware of sof...
International audienceDefining access control policies in a data integration scenario is a challengi...
The new millennium has brought about an increase in the use of business intelligence and knowledge m...
The new millennium has brought about an increase in the use of business intelligence and knowledge m...
In this thesis we are interested in controlling the access to a data integration system. In a data i...
International audienceThis paper presents an approach allowing for a given security and utility requ...
We present a secure service prototype built from untrusted,contributed code.The service manages priv...
Mediation techniques support integrated query processing among heterogeneous databases. While such...
What is the best way of managing access to sensitive data? This is not a straightforward question, a...
© 2020 Elsevier Inc. While databases provide capabilities to enforce security and privacy policies, ...
As the web moves increasingly towards publishing data, a significant challenge arises when integrati...
In this paper, we apply a formal approach to model a DIS with the SecureDIS security policies and ve...
With the web witnessing an immense shift towards publishing data, integrating data from diverse sour...
International audienceThis paper presents a well-founded language allowing in one hand data owners t...
Abstract — In the context of Data Integration Systems (DIS), integrating data across organizations v...
Security in software applications is frequently an afterthought. Even if developers are aware of sof...
International audienceDefining access control policies in a data integration scenario is a challengi...
The new millennium has brought about an increase in the use of business intelligence and knowledge m...
The new millennium has brought about an increase in the use of business intelligence and knowledge m...
In this thesis we are interested in controlling the access to a data integration system. In a data i...
International audienceThis paper presents an approach allowing for a given security and utility requ...
We present a secure service prototype built from untrusted,contributed code.The service manages priv...
Mediation techniques support integrated query processing among heterogeneous databases. While such...
What is the best way of managing access to sensitive data? This is not a straightforward question, a...
© 2020 Elsevier Inc. While databases provide capabilities to enforce security and privacy policies, ...