Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: DBSec 2011
Guest editors: Yingjiu LiGuest Editor
Article type: Research Article
Authors: Ciriani, Valentina | De Capitani di Vimercati, Sabrina | Foresti, Sara | Livraga, Giovanni | Samarati, Pierangela; **
Affiliations: DTI, Università degli Studi di Milano, Crema, Italy. E-mails: valentina.ciriani@unimi.it, sabrina.decapitani@unimi.it, sara.foresti@unimi.it, giovanni.livraga@unimi.it, pierangela.samarati@unimi.it
Correspondence: [**] Corresponding author: Pierangela Samarati, DTI, Università degli Studi di Milano, Via Bramante 65, 26013 Crema, Italy. Tel.: +39 0373 898061; Fax: +39 0373 898074; E-mail: pierangela.samarati@unimi.it.
Note: [*] A preliminary version of this paper appeared under the title “Enforcing confidentiality and data visibility constraints: An OBDD approach”, in: Proceedings of the 25th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2011), Richmond, VA, USA, July 2011 [13].
Abstract: With the growing needs for data sharing and dissemination, privacy-preserving data publishing is becoming an important issue that still requires further investigation. In this paper, we make a step towards private data publication by proposing a solution based on the release of vertical views (fragments) over a relational table that satisfy confidentiality and visibility constraints expressing requirements for information protection and release, respectively. We translate the problem of computing a fragmentation composed of the minimum number of fragments into the problem of computing a maximum weighted clique over a fragmentation graph. The fragmentation graph models fragments, efficiently computed using Ordered Binary Decision Diagrams (OBDDs), that satisfy all the confidentiality constraints and a subset of the visibility constraints defined in the system. We then show an exact and a heuristic algorithm for computing a minimal and a locally minimal fragmentation, respectively. Finally, we provide experimental results comparing the execution time and the fragmentations returned by the exact and heuristic algorithms. The experiments show that the heuristic algorithm has low computation cost and computes a fragmentation close to optimum.
Keywords: Privacy, fragmentation, confidentiality and visibility constraints, OBDDs, maximum weighted clique
DOI: 10.3233/JCS-2012-0449
Journal: Journal of Computer Security, vol. 20, no. 5, pp. 463-508, 2012
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl