@incollection{, F421D2EC3C92297725111956CFEABEBD , author={{Dr. Norjihan AbdulGhani} and {HarihodinSelamat} and {Zailani MohamedSidek} and {}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}12415 } @book{b0, , title={{}} , author={{ RAgrawal } and { JKiernan } and { RSrikant }} , year={2002a} } @book{b1, , title={{Hippocratic Database}} , note={Paper presented at the 28th} } @book{b2, , title={{International Conference on Very Large Data Bases}} Hong Kong, China } @incollection{b3, , title={{Personalizing access control by generalizing access control}} , author={{ SBarker }} , booktitle={{Proceeding of the 15th ACM symposium on Access control models and technologies}} eeding of the 15th ACM symposium on Access control models and technologies , year={2010} } @book{b4, , author={{ EBertino } and { RSandhu }} , title={{Database Security -Concepts, Approaches, and Challenges. IEEE Transactions on Dependable and Secure Computing}} , year={2005} 2 } @book{b5, , title={{Rethinking Public Key Infrastructures and Digital Certificates : Building in Privacy}} , author={{ SABrands }} , year={2000} , address={Cambridge, Massachusetts} , note={Document Number} } @incollection{b6, , title={{Purpose based access control of complex data for privacy protection}} , author={{ JByun } and { EBertino } and { NLi }} , booktitle={{Symposium on Access Control Model and Technologies}} , publisher={SACMAT} , year={2005} } @incollection{b7, , title={{Purpose based access control for privacy protection in relational database systems}} , author={{ J.-WByun } and { NLi }} , journal={{The International Journal on Very Large Data Bases}} 17 4 , year={2008} } @book{b8, , title={{}} , author={{ SChauduri } and { RKaushik } and { RRamamurthy }} , year={2011} } @book{b9, , title={{Database Access Control & Privacy: Is there a Commom Ground? 5 th Biennial Conference on Innovative Data Systems Research. (CIDR '11)}} } @incollection{b10, , title={{Limiting Disclosure in Hippocratic Databases}} , author={{ KLefevre } and { RAgrawal } and { VErcegovac } and { RRamakrishnan }} , booktitle={{Paper presented at the 30th international Conference on Very}} , year={2004} } @incollection{b11, , title={{Privacy-aware role based access control}} , author={{ Large Data Bases } and { CanadaToronto } and { QNi } and { ATrombetta } and { EBertino } and { JLobo }} , booktitle={{Proceedings of the 12th ACM symposium on Access control models and technologies}} the 12th ACM symposium on Access control models and technologies , year={2007} } @incollection{b12, , title={{Srilekha Madumbai, -Certificate-based Authorization policy in a PKI Environment?}} , author={{ MaryRThompson } and { AbdellilahEssiari }} , journal={{ACM Transactions on Information and System Security (TISSEC)}} 6 4 , year={November 2003} } @incollection{b13, , title={{Access Control Methodology For Sharing Of Open And Domain Confined Data Using Standard Credentials}} , author={{ DNirmal } and { VRuchi }} , journal={{International Journal on Computer Science and Engineering}} 1 3 , year={2009. 2009} } @incollection{b14, , title={{Access control: Policies, models, and mechanisms}} , author={{ VSamarati }} , booktitle={{FOSAD'00: International School on Foundations of Security Analysis and Design}} , year={2001} } @incollection{b15, , title={{Cryptography based access control in healthcare web systems}} , author={{ AWasim } and { Al-Hamdani }} , booktitle={{Information Security Curriculum Development Conference}} , year={2010. 2010} } @book{b16, , title={{Privacy and Freedom}} , author={{ AWestin }} , year={1967} , publisher={Atheneum} , address={New York} } @book{b17, , title={{Authorization and Attribute Certificates for widely Distributed Access Control?}} , author={{ WilliamJohnston } and { SrilekhaMudumbai } and { MaryThompson }} , year={1998} , publisher={IEEE WETICE} } @book{b18, , title={{}} , author={{ NYang } and { HBarringer } and { NZhang }} , year={2008} }