Extending SQL to Allow the Active Usage of Purposes
The protection of private information revolves around the protection of data by making use of purposes. These purposes indicate why data is stored, and what the data will be used for (referred to as specification/verification phases). In this article, the active specification of purposes during acce...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 131 |
---|---|
container_issue | |
container_start_page | 123 |
container_title | |
container_volume | |
creator | van Staden, Wynand Olivier, Martin S. |
description | The protection of private information revolves around the protection of data by making use of purposes. These purposes indicate why data is stored, and what the data will be used for (referred to as specification/verification phases).
In this article, the active specification of purposes during access requests is considered. In particular it is argued that the subject that wishes to get access to data should explicitly specify their reason for wanting the data; as opposed to verification taking place by implicit examination of the subject’s profile. To facilitate this active specification extensions to the SQL data manipulation language is considered. |
doi_str_mv | 10.1007/11824633_13 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_19686670</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>19686670</sourcerecordid><originalsourceid>FETCH-LOGICAL-p219t-d3da5e233665f2122a93de850d7e5e88e75a006e6bd64cbd95d94f97a3b0c8803</originalsourceid><addsrcrecordid>eNpNkDtPwzAUhc1LopRO_AEvDAyBa18_x6oqD6kSIOhsObFTAiGJ4lDg39OqIHGWM5xPZ_gIOWNwyQD0FWOGC4XoGO6RE5QCUGvJ-T4ZMcVYhijsAZlYbf42EIdkBAg8s1rgMZmk9AqbIAcJekRw_jXEJlTNij49LujQ0mldt590eIl0WgzVOtJl8qtI25I-fPRdm2I6JUelr1Oc_PaYLK_nz7PbbHF_czebLrKOMztkAYOXkSMqJUvOOPcWQzQSgo4yGhO19AAqqjwoUeTBymBFabXHHApjAMfkfPfb-VT4uux9U1TJdX317vtvx6wySuktd7Hj0mZqVrF3edu-JcfAba25f9bwByL-V1o</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Extending SQL to Allow the Active Usage of Purposes</title><source>Springer Books</source><creator>van Staden, Wynand ; Olivier, Martin S.</creator><contributor>Furnell, Stevel ; Fischer-Hübner, Simone ; Lambrinoudakis, Costas</contributor><creatorcontrib>van Staden, Wynand ; Olivier, Martin S. ; Furnell, Stevel ; Fischer-Hübner, Simone ; Lambrinoudakis, Costas</creatorcontrib><description>The protection of private information revolves around the protection of data by making use of purposes. These purposes indicate why data is stored, and what the data will be used for (referred to as specification/verification phases).
In this article, the active specification of purposes during access requests is considered. In particular it is argued that the subject that wishes to get access to data should explicitly specify their reason for wanting the data; as opposed to verification taking place by implicit examination of the subject’s profile. To facilitate this active specification extensions to the SQL data manipulation language is considered.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540377504</identifier><identifier>ISBN: 3540377506</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 3540377522</identifier><identifier>EISBN: 9783540377528</identifier><identifier>DOI: 10.1007/11824633_13</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Access Control ; Access Control Model ; Access Request ; Applied sciences ; Computer science; control theory; systems ; Computer systems and distributed systems. User interface ; Exact sciences and technology ; Information systems. Data bases ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Purpose Lattice ; Role Base Access Control ; Software</subject><ispartof>Lecture notes in computer science, 2006, p.123-131</ispartof><rights>Springer-Verlag Berlin Heidelberg 2006</rights><rights>2007 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/11824633_13$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/11824633_13$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,779,780,784,789,790,793,4048,4049,27924,38254,41441,42510</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=19686670$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Furnell, Stevel</contributor><contributor>Fischer-Hübner, Simone</contributor><contributor>Lambrinoudakis, Costas</contributor><creatorcontrib>van Staden, Wynand</creatorcontrib><creatorcontrib>Olivier, Martin S.</creatorcontrib><title>Extending SQL to Allow the Active Usage of Purposes</title><title>Lecture notes in computer science</title><description>The protection of private information revolves around the protection of data by making use of purposes. These purposes indicate why data is stored, and what the data will be used for (referred to as specification/verification phases).
In this article, the active specification of purposes during access requests is considered. In particular it is argued that the subject that wishes to get access to data should explicitly specify their reason for wanting the data; as opposed to verification taking place by implicit examination of the subject’s profile. To facilitate this active specification extensions to the SQL data manipulation language is considered.</description><subject>Access Control</subject><subject>Access Control Model</subject><subject>Access Request</subject><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Computer systems and distributed systems. User interface</subject><subject>Exact sciences and technology</subject><subject>Information systems. Data bases</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Purpose Lattice</subject><subject>Role Base Access Control</subject><subject>Software</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540377504</isbn><isbn>3540377506</isbn><isbn>3540377522</isbn><isbn>9783540377528</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNpNkDtPwzAUhc1LopRO_AEvDAyBa18_x6oqD6kSIOhsObFTAiGJ4lDg39OqIHGWM5xPZ_gIOWNwyQD0FWOGC4XoGO6RE5QCUGvJ-T4ZMcVYhijsAZlYbf42EIdkBAg8s1rgMZmk9AqbIAcJekRw_jXEJlTNij49LujQ0mldt590eIl0WgzVOtJl8qtI25I-fPRdm2I6JUelr1Oc_PaYLK_nz7PbbHF_czebLrKOMztkAYOXkSMqJUvOOPcWQzQSgo4yGhO19AAqqjwoUeTBymBFabXHHApjAMfkfPfb-VT4uux9U1TJdX317vtvx6wySuktd7Hj0mZqVrF3edu-JcfAba25f9bwByL-V1o</recordid><startdate>2006</startdate><enddate>2006</enddate><creator>van Staden, Wynand</creator><creator>Olivier, Martin S.</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2006</creationdate><title>Extending SQL to Allow the Active Usage of Purposes</title><author>van Staden, Wynand ; Olivier, Martin S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p219t-d3da5e233665f2122a93de850d7e5e88e75a006e6bd64cbd95d94f97a3b0c8803</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Access Control</topic><topic>Access Control Model</topic><topic>Access Request</topic><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Computer systems and distributed systems. User interface</topic><topic>Exact sciences and technology</topic><topic>Information systems. Data bases</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Purpose Lattice</topic><topic>Role Base Access Control</topic><topic>Software</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>van Staden, Wynand</creatorcontrib><creatorcontrib>Olivier, Martin S.</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>van Staden, Wynand</au><au>Olivier, Martin S.</au><au>Furnell, Stevel</au><au>Fischer-Hübner, Simone</au><au>Lambrinoudakis, Costas</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Extending SQL to Allow the Active Usage of Purposes</atitle><btitle>Lecture notes in computer science</btitle><date>2006</date><risdate>2006</risdate><spage>123</spage><epage>131</epage><pages>123-131</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540377504</isbn><isbn>3540377506</isbn><eisbn>3540377522</eisbn><eisbn>9783540377528</eisbn><abstract>The protection of private information revolves around the protection of data by making use of purposes. These purposes indicate why data is stored, and what the data will be used for (referred to as specification/verification phases).
In this article, the active specification of purposes during access requests is considered. In particular it is argued that the subject that wishes to get access to data should explicitly specify their reason for wanting the data; as opposed to verification taking place by implicit examination of the subject’s profile. To facilitate this active specification extensions to the SQL data manipulation language is considered.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/11824633_13</doi><tpages>9</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0302-9743 |
ispartof | Lecture notes in computer science, 2006, p.123-131 |
issn | 0302-9743 1611-3349 |
language | eng |
recordid | cdi_pascalfrancis_primary_19686670 |
source | Springer Books |
subjects | Access Control Access Control Model Access Request Applied sciences Computer science control theory systems Computer systems and distributed systems. User interface Exact sciences and technology Information systems. Data bases Memory and file management (including protection and security) Memory organisation. Data processing Purpose Lattice Role Base Access Control Software |
title | Extending SQL to Allow the Active Usage of Purposes |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-11T18%3A41%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Extending%20SQL%20to%20Allow%20the%20Active%20Usage%20of%20Purposes&rft.btitle=Lecture%20notes%20in%20computer%20science&rft.au=van%20Staden,%20Wynand&rft.date=2006&rft.spage=123&rft.epage=131&rft.pages=123-131&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540377504&rft.isbn_list=3540377506&rft_id=info:doi/10.1007/11824633_13&rft_dat=%3Cpascalfrancis_sprin%3E19686670%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=3540377522&rft.eisbn_list=9783540377528&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |