Concepts for Database Privacy

  • H. H. Brüggemann
Part of the International Centre for Mechanical Sciences book series (CISM, volume 347)


Privacy is the individual’s right of informational self-determination. Concepts for a privacy model of data are presented. A privacy view of data collects and encapsulates the personal data of one data subject. All kinds of individuals (e.g. users, data subjects) are uniformly represented in this model. Individual personal data is -of course- considered as private, but structural personal data is considered as public. Access rights are divided into structural and individual rights. Structural rights are authorities which can be used for a certain purpose only and refer to technical roles. Technical roles model the behavior pattern of social roles. The set of individuals which is concerned by a social role is modeled by individual rights.


Database System Social Role Personal Data Data Subject Class Hierarchy 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    Congress, 93rd; 2nd Session: Privacy Act of 1974, Public Law 93–579.Google Scholar
  2. [2]
    Bundesverfassungsgericht: Urteil vom 15. Dez. 1983 zum Volkszählungsgesetz 1983, Bundesanzeiger 35, 241a (1983).Google Scholar
  3. [3]
    Council of Europe: Convention for the Protection of Individuals with Regard to Automatic Processing of Personal Data (Jan 28,1981), Bundesgesetzblatt, Teil II, 19.03. 1985, 538–550.Google Scholar
  4. [4]
    Biskup, J., Brüggemann, H.H.: The personal model of data: towards a privacy-oriented information system, Computers & Security, Vol. 7, 1988, 575–597.CrossRefGoogle Scholar
  5. [5]
    Brüggemann, H.H.: Object-oriented Authorization, in this volume.Google Scholar
  6. [6]
    Brüggemann, H.H.: Interaction of authorities and acquaintances in the DORIS privacy model of data, in: Proc. 2nd Symposium on Mathematical Fundamentals of Database Systems, June 1989, Visegrâd, Hungary, LNCS 364, 1989, 85–99.Google Scholar
  7. [7]
    Graubart, R.: On the need for a third form of access control, in: Proc. 12th National Computer Security Conference, Baltimore, Oct. 1989.Google Scholar
  8. [8]
    Jonscher, D.: Extending access control with duties–realized by active mechanisms, in: Thuraisingham, B.M., Landwehr, C.E. (eds.), Database Security, VI: Status and Prospects, Elsevier, 1993, 91–112.Google Scholar

Copyright information

© Springer-Verlag Wien 1994

Authors and Affiliations

  • H. H. Brüggemann
    • 1
  1. 1.University of HildesheimHildesheimGermany

Personalised recommendations