In: Proceedings of the 22nd International Conference
on Data Engineering Workshops (ICDEW’06).
Washington, DC, USA: IEEE.
Boyens, C. et al. 2004. On privacy-preserving access to
distributed heterogeneous healthcare information. In:
Proceedings of the 37th Hawaii International
Conference on System Sciences. Big Island, Hawaii,
USA, pp. 1–10.
Van Den Braak, S. W. et al. 2012. Trusted third parties for
secure and privacy-preserving data integration and
sharing in the public sector. In: Proceedings of the
13th Annual International Conference on Digital
Government Research - dg.o ’12. College Park, MD,
USA: ACM Press, pp. 135 –144.
Braghin, C. et al. 2003. Information leakage detection in
boundary ambients. Electronic Notes in Theoretical
Computer Science (78), pp. 123–143.
Carey, M. J. et al. 2012. Data Services. Communications
of the ACM 55(6), pp. 86–97.
Clifton, C. et al. 2004. Privacy-preserving data integration
and sharing. In: Proceedings of the 9th ACM SIGMOD
workshop on Research issues in data mining and
knowledge discovery - DMKD ’04. Paris, France:
ACM Press, p. 19.
Cruz, I. et al. 2008. A Secure Mediator for Integrating
Multiple Level Access Control Policies. Knowledge-
Based Intelligent Information and Engineering
Systems, pp. 354–362.
CWE 2013. CWE-200: Information Leak (Information
Exposure). [Online] Available at: http://cwe.mitre.org/
data/definitions/200.html [Accessed: 2 August 2013].
Dawson, S. et al. 2000. Providing security and
interoperation of heterogeneous systems. Distributed
and Parallel Databases (8), pp. 119–145.
Dicelie, J. J. et al. 2001. Data integration system.
Eze, B. et al. 2010. Policy-based Data Integration for e-
Health Monitoring Processes in a B2B Environment:
Experiences from Canada. Journal of theoretical and
applied electronic commerce research 5(1), pp. 56–70.
Flechais, I. et al. 2013. In the balance in Saudi Arabia:
security, privacy and trust. In: Extended Abstracts on
Human Factors in Computing Systems CHI ’13. Paris,
France, pp. 823–828.
Fung, B. C. M. et al. 2012. Service-Oriented Architecture
for High-Dimensional Private Data Mashup. IEEE
Transactions on Services Computing 5(3), pp. 373–
386.
Gollmann, D. 2006. Computer Security. Second Edi. John
Wiley & Sons.
Gusmini, A. and Leida, M. 2011. A patent: Data
Integration System.
Haddad, M. et al. 2012. Data Integration in Presence of
Authorization Policies. In: IEEE 11th International
Conference on Trust, Security and Privacy in
Computing and Communications. Liverpool, UK:
IEEE, pp. 92–99.
Halevy, A. et al. 2006. Data integration: the teenage years.
In: 32nd International Conference on Very large data
bases VLDB’06. Seoul, Korea.
Harris, D. et al. 2007. Standards for secure data sharing
across organizations. Computer Standards &
Interfaces 29(1), pp. 86–96.
Hong, Y. et al. 2008. Protection of Patient’s Privacy and
Data Security in E-Health Services. In: 2008
International Conference on BioMedical Engineering
and Informatics. Sanya, China: IEEE, pp. 643–647.
Hu, Y. and Yang, J. 2011. A semantic privacy-preserving
model for data sharing and integration. In:
Proceedings of the International Conference on Web
Intelligence, Mining and Semantics - WIMS ’11.
Sogndal, Norway: ACM Press.
Hung, P. 2005. Towards a privacy access control model
for e-healthcare services. In: Third Annual Conference
on Privacy, Security and Trust. Andrews, New
Brunswick, Canada.
ISO 2014. ISO/IEC27000: Information technology —
Security techniques — Information security
management systems — Overview and vocabulary.
BSI Standards Publication.
Jawad, M. et al. 2013. Supporting Data Privacy in P2P
Systems. Security and Privacy Preserving in Social
Networks, pp. 1–51.
Jurczyk, P. and Xiong, L. 2008. Towards privacy-
preserving integration of distributed heterogeneous
data. In: Proceedings of the 2nd PhD workshop on
Information and knowledge management. Napa
Valley, California, USA, pp. 65–72.
Khattak, Z. et al. 2012. Evaluation of Unified Security,
Trust and Privacy Framework (UnifiedSTPF) for
Federated Identity and Access Management (FIAM)
Mode. International Journal of Computer
Applications 54(6), pp. 12–19.
Lamb, P. et al. 2006. Role-based access control for data
service integration. In: Proceedings of the 3rd ACM
workshop on Secure web services - SWS ’06.
Alexandria, VA,USA: ACM Press, pp. 3–12.
Manan, J. A. et al. 2011. Security, Trust and Privacy–A
New Direction for Pervasive Computing. In:
Proceedings of the 15th WSEAS international
conference on Computers. Stevens Point, Wisconsin,
USA, pp. 56–60.
McGraw, G. 2004. Software security. IEEE Security &
Privacy Magazine, pp. 80–83.
Meingast, M. et al. 2006. Security and privacy issues with
health care information technology. In: Proceedings of
the 28th IEEE Annual International Conference of
Engineering in Medicine and Biology Society. New
York, New York, USA, pp. 5453–5458.
Mohammed, N. et al. 2011. Anonymity meets game
theory: secure data integration with malicious
participants. The VLDB Journal—The International
Journal on Very Large Data Bases 20(4), pp. 567–
588.
Morton, A. and Sasse, M. 2012. Privacy is a process, not a
PET: a theory for effective privacy practice. In:
Proceedings of the 2012 workshop on new security
paradigms NSPW’12. Bertinoro, Italy, pp. 87–104.
CLOSER2015-DoctoralConsortium
36