Extending SQL to Allow the Active Usage of Purposes

The protection of private information revolves around the protection of data by making use of purposes. These purposes indicate why data is stored, and what the data will be used for (referred to as specification/verification phases). In this article, the active specification of purposes during acce...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: van Staden, Wynand, Olivier, Martin S.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 131
container_issue
container_start_page 123
container_title
container_volume
creator van Staden, Wynand
Olivier, Martin S.
description The protection of private information revolves around the protection of data by making use of purposes. These purposes indicate why data is stored, and what the data will be used for (referred to as specification/verification phases). In this article, the active specification of purposes during access requests is considered. In particular it is argued that the subject that wishes to get access to data should explicitly specify their reason for wanting the data; as opposed to verification taking place by implicit examination of the subject’s profile. To facilitate this active specification extensions to the SQL data manipulation language is considered.
doi_str_mv 10.1007/11824633_13
format Conference Proceeding
fullrecord <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_19686670</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>19686670</sourcerecordid><originalsourceid>FETCH-LOGICAL-p219t-d3da5e233665f2122a93de850d7e5e88e75a006e6bd64cbd95d94f97a3b0c8803</originalsourceid><addsrcrecordid>eNpNkDtPwzAUhc1LopRO_AEvDAyBa18_x6oqD6kSIOhsObFTAiGJ4lDg39OqIHGWM5xPZ_gIOWNwyQD0FWOGC4XoGO6RE5QCUGvJ-T4ZMcVYhijsAZlYbf42EIdkBAg8s1rgMZmk9AqbIAcJekRw_jXEJlTNij49LujQ0mldt590eIl0WgzVOtJl8qtI25I-fPRdm2I6JUelr1Oc_PaYLK_nz7PbbHF_czebLrKOMztkAYOXkSMqJUvOOPcWQzQSgo4yGhO19AAqqjwoUeTBymBFabXHHApjAMfkfPfb-VT4uux9U1TJdX317vtvx6wySuktd7Hj0mZqVrF3edu-JcfAba25f9bwByL-V1o</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Extending SQL to Allow the Active Usage of Purposes</title><source>Springer Books</source><creator>van Staden, Wynand ; Olivier, Martin S.</creator><contributor>Furnell, Stevel ; Fischer-Hübner, Simone ; Lambrinoudakis, Costas</contributor><creatorcontrib>van Staden, Wynand ; Olivier, Martin S. ; Furnell, Stevel ; Fischer-Hübner, Simone ; Lambrinoudakis, Costas</creatorcontrib><description>The protection of private information revolves around the protection of data by making use of purposes. These purposes indicate why data is stored, and what the data will be used for (referred to as specification/verification phases). In this article, the active specification of purposes during access requests is considered. In particular it is argued that the subject that wishes to get access to data should explicitly specify their reason for wanting the data; as opposed to verification taking place by implicit examination of the subject’s profile. To facilitate this active specification extensions to the SQL data manipulation language is considered.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540377504</identifier><identifier>ISBN: 3540377506</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 3540377522</identifier><identifier>EISBN: 9783540377528</identifier><identifier>DOI: 10.1007/11824633_13</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Access Control ; Access Control Model ; Access Request ; Applied sciences ; Computer science; control theory; systems ; Computer systems and distributed systems. User interface ; Exact sciences and technology ; Information systems. Data bases ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Purpose Lattice ; Role Base Access Control ; Software</subject><ispartof>Lecture notes in computer science, 2006, p.123-131</ispartof><rights>Springer-Verlag Berlin Heidelberg 2006</rights><rights>2007 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/11824633_13$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/11824633_13$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,779,780,784,789,790,793,4048,4049,27924,38254,41441,42510</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=19686670$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Furnell, Stevel</contributor><contributor>Fischer-Hübner, Simone</contributor><contributor>Lambrinoudakis, Costas</contributor><creatorcontrib>van Staden, Wynand</creatorcontrib><creatorcontrib>Olivier, Martin S.</creatorcontrib><title>Extending SQL to Allow the Active Usage of Purposes</title><title>Lecture notes in computer science</title><description>The protection of private information revolves around the protection of data by making use of purposes. These purposes indicate why data is stored, and what the data will be used for (referred to as specification/verification phases). In this article, the active specification of purposes during access requests is considered. In particular it is argued that the subject that wishes to get access to data should explicitly specify their reason for wanting the data; as opposed to verification taking place by implicit examination of the subject’s profile. To facilitate this active specification extensions to the SQL data manipulation language is considered.</description><subject>Access Control</subject><subject>Access Control Model</subject><subject>Access Request</subject><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Computer systems and distributed systems. User interface</subject><subject>Exact sciences and technology</subject><subject>Information systems. Data bases</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Purpose Lattice</subject><subject>Role Base Access Control</subject><subject>Software</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540377504</isbn><isbn>3540377506</isbn><isbn>3540377522</isbn><isbn>9783540377528</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNpNkDtPwzAUhc1LopRO_AEvDAyBa18_x6oqD6kSIOhsObFTAiGJ4lDg39OqIHGWM5xPZ_gIOWNwyQD0FWOGC4XoGO6RE5QCUGvJ-T4ZMcVYhijsAZlYbf42EIdkBAg8s1rgMZmk9AqbIAcJekRw_jXEJlTNij49LujQ0mldt590eIl0WgzVOtJl8qtI25I-fPRdm2I6JUelr1Oc_PaYLK_nz7PbbHF_czebLrKOMztkAYOXkSMqJUvOOPcWQzQSgo4yGhO19AAqqjwoUeTBymBFabXHHApjAMfkfPfb-VT4uux9U1TJdX317vtvx6wySuktd7Hj0mZqVrF3edu-JcfAba25f9bwByL-V1o</recordid><startdate>2006</startdate><enddate>2006</enddate><creator>van Staden, Wynand</creator><creator>Olivier, Martin S.</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2006</creationdate><title>Extending SQL to Allow the Active Usage of Purposes</title><author>van Staden, Wynand ; Olivier, Martin S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p219t-d3da5e233665f2122a93de850d7e5e88e75a006e6bd64cbd95d94f97a3b0c8803</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Access Control</topic><topic>Access Control Model</topic><topic>Access Request</topic><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Computer systems and distributed systems. User interface</topic><topic>Exact sciences and technology</topic><topic>Information systems. Data bases</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Purpose Lattice</topic><topic>Role Base Access Control</topic><topic>Software</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>van Staden, Wynand</creatorcontrib><creatorcontrib>Olivier, Martin S.</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>van Staden, Wynand</au><au>Olivier, Martin S.</au><au>Furnell, Stevel</au><au>Fischer-Hübner, Simone</au><au>Lambrinoudakis, Costas</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Extending SQL to Allow the Active Usage of Purposes</atitle><btitle>Lecture notes in computer science</btitle><date>2006</date><risdate>2006</risdate><spage>123</spage><epage>131</epage><pages>123-131</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540377504</isbn><isbn>3540377506</isbn><eisbn>3540377522</eisbn><eisbn>9783540377528</eisbn><abstract>The protection of private information revolves around the protection of data by making use of purposes. These purposes indicate why data is stored, and what the data will be used for (referred to as specification/verification phases). In this article, the active specification of purposes during access requests is considered. In particular it is argued that the subject that wishes to get access to data should explicitly specify their reason for wanting the data; as opposed to verification taking place by implicit examination of the subject’s profile. To facilitate this active specification extensions to the SQL data manipulation language is considered.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/11824633_13</doi><tpages>9</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof Lecture notes in computer science, 2006, p.123-131
issn 0302-9743
1611-3349
language eng
recordid cdi_pascalfrancis_primary_19686670
source Springer Books
subjects Access Control
Access Control Model
Access Request
Applied sciences
Computer science
control theory
systems
Computer systems and distributed systems. User interface
Exact sciences and technology
Information systems. Data bases
Memory and file management (including protection and security)
Memory organisation. Data processing
Purpose Lattice
Role Base Access Control
Software
title Extending SQL to Allow the Active Usage of Purposes
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-11T18%3A41%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Extending%20SQL%20to%20Allow%20the%20Active%20Usage%20of%20Purposes&rft.btitle=Lecture%20notes%20in%20computer%20science&rft.au=van%20Staden,%20Wynand&rft.date=2006&rft.spage=123&rft.epage=131&rft.pages=123-131&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540377504&rft.isbn_list=3540377506&rft_id=info:doi/10.1007/11824633_13&rft_dat=%3Cpascalfrancis_sprin%3E19686670%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=3540377522&rft.eisbn_list=9783540377528&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true