SBBD

Paper Registration

1

Select Book

2

Select Paper

3

Fill in paper information

4

Congratulations

Fill in your paper information

English Information

(*) To change the order drag the item to the new position.

Authors
# Name
1 Ítalo de Abreu(italo.abreu@lsbd.alu.ufc.br)
2 Francisco Praciano(daniel.praciano@lsbd.ufc.br)
3 Paulo Amora(paulo.amora@lsbd.ufc.br)
4 Javam Machado(javam.machado@lsbd.ufc.br)

(*) To change the order drag the item to the new position.

Reference
# Reference
1 Agrawal, R., Bird, P., Grandison, T., Kiernan, J., Logan, S., and Rjaibi, W. (2005). Extending relational database systems to automatically enforce privacy policies. In ICDE, pages 1013–1022. IEEE Computer Society.
2 Brasil (2018). Lei nº 13.709 - lei geral de proteção de dados pessoais (lgpd). http://www.planalto.gov.br/ccivil_03/_ato2015-2018/ 2018/lei/l13709.htm. Acessado em: 01-07-2021.
3 Byun, J. and Li, N. (2008). Purpose based access control for privacy protection in relational database systems. VLDB J., 17(4):603–619
4 California (2018). California consumer privacy act (ccpa). https://www. caprivacy.org/. Acessado em: 01-07-2021.
5 Elmasri, R. and Navathe, S. B. (2000). Fundamentals of Database Systems, 3rd Edition. Addison-Wesley-Longman.
6 General Data Protection Regulation (2016). Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46. Official Journal of the European Union, 59:1–88.
7 Kraska, T., Stonebraker, M., Brodie, M. L., Servan-Schreiber, S., and Weitzner, D. J. (2019). SchengenDB: A data protection database proposal. In Heterogeneous Data Management, Polystores, and Analytics for Healthcare - VLDB 2019 Workshops, Poly and DMAH, Los Angeles, CA, USA, August 30, 2019, volume 11721 of Lecture Notes in Computer Science, pages 24–38. Springer.
8 Machado, J. C. and Amora, P. R. P. (2020). How can db systems be ready for privacy regulations. In SBBD. SBC
9 Pappachan, P., Yus, R., Mehrotra, S., and Freytag, J. (2020). Sieve: A middleware approach to scalable access control for database management systems. Proc. VLDB Endow., 13(11):2424–2437.
10 Pun, S. (2010). Prisql: a privacy preserving sql language.
11 Rizvi, S., Mendelzon, A. O., Sudarshan, S., and Roy, P. (2004). Extending query rewriting techniques for fine-grained access control. In SIGMOD Conference, pages 551–562. ACM.
12 Shastri, S., Banakar, V., Wasserman, M., Kumar, A., and Chidambaram, V. (2020). Understanding and benchmarking the impact of GDPR on database systems. Proc. VLDB Endow., 13(7):1064–1077
13 Solove, D. J. and Citron, D. K. (2017). Risk and anxiety: A theory of data-breach harms. Tex. L. Rev., 96:737.
14 Wang, L., Near, J. P., Somani, N., Gao, P., Low, A., Dao, D., and Song, D. (2019). Data capsule: A new paradigm for automatic compliance with data privacy regulations. CoRR, abs/1909.00077