Compliance with data protection laws using Hippocratic Database active enforcement and auditing

被引:10
作者
Johnson, C. M. [1 ]
Grandison, T. W. A. [1 ]
机构
[1] IBM Corp, Div Res, Almaden Res Ctr, San Jose, CA 95120 USA
关键词
Access control - Data processing - Database systems - Electronic document identification systems - Middleware - Regulatory compliance;
D O I
10.1147/sj.462.0255
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Governments worldwide are enacting data protection laws that restrict the disclosure and processing of personal information. These laws impose administrative and financial burdens on companies that manage personal information and may hinder the legitimate and valuable sharing and analysis of this information. In this paper we describe an integrated set of technologies, known as the Hippocratic Database (HDB), which enables compliance with security and privacy regulations without impeding the legitimate flow of information. HDB's Control Center allows companies to specify fine-grained disclosure policies based on the role of the user, the purpose of the access, the intended recipient, and other disclosure conditions. Its Active Enforcement component transparently enforces these policies by transforming user queries in a middleware layer to ensure that the database returns only policy-compliant information. HDB's Compliance Auditing system efficiently tracks all database accesses and allows auditors to formulate precise audit queries to monitor compliance with privacy and security policies. in this paper, we outline the basic architecture of the HDB solution, discuss the advantages of our approach, and illustrate the features of each component with practical compliance scenarios from the financial services industry.
引用
收藏
页码:255 / 264
页数:10
相关论文
共 8 条
[1]  
Agrawal R., 2002, Proceedings of the Twenty-eighth International Conference on Very Large Data Bases, P143
[2]  
AGRAWAL R, 2003, P 12 INT C WORLD WID, P629
[3]  
Agrawal R., 2004, PROC 30 INT C VERY L, P516
[4]  
[Anonymous], 2004, INFORM AGE
[5]  
LeFevre K., 2004, P 30 INT C VER LARG, P108
[6]  
MIKLAU G, 2004, P ACM SIGMOD INT C M, P575
[7]  
Nanda A., 2003, ORACLE PRIVACY SECUR
[8]  
Snodgrass RichardT., 2004, Proceedings_of_the_Thirtieth_international_conference_on_Very_large data_bases-Volume_, V30, P504