Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ji-Won Byun is active.

Publication


Featured researches published by Ji-Won Byun.


symposium on access control models and technologies | 2005

Purpose based access control of complex data for privacy protection

Ji-Won Byun; Elisa Bertino; Ninghui Li

As privacy becomes a major concern for both consumers and enterprises, many research efforts have been devoted to the development of privacy protecting technology. We recently proposed a privacy preserving access control model for relational databases,where purpose information associated with a given data element specifies the intended use of the data element. In this paper, we extend our previous work to handle other advanced data managementsystems, such as the ones based on XML and the ones based on the object-relational data model. Another contribution of our paper isthat we address the problem of how to determine the purpose forwhich certain data are accessed by a given user. Our proposedsolution relies on the well-known RBAC model as well as the notionof conditional role which is based on the notions of role attributeand system attribute.


database systems for advanced applications | 2007

Efficient k-anonymization using clustering techniques

Ji-Won Byun; Ashish Kamra; Elisa Bertino; Ninghui Li

k-anonymization techniques have been the focus of intense research in the last few years. An important requirement for such techniques is to ensure anonymization of data while at the same time minimizing the information loss resulting from data modifications. In this paper we propose an approach that uses the idea of clustering to minimize information loss and thus ensure good data quality. The key observation here is that data records that are naturally similar to each other should be part of the same equivalence class. We thus formulate a specific clustering problem, referred to as k-member clustering problem. We prove that this problem is NP-hard and present a greedy heuristic, the complexity of which is in O(n2). As part of our approach we develop a suitable metric to estimate the information loss introduced by generalizations, which works for both numeric and categorical data.


very large data bases | 2008

Purpose based access control for privacy protection in relational database systems

Ji-Won Byun; Ninghui Li

In this article, we present a comprehensive approach for privacy preserving access control based on the notion of purpose. In our model, purpose information associated with a given data element specifies the intended use of the data element. A key feature of our model is that it allows multiple purposes to be associated with each data element and also supports explicit prohibitions, thus allowing privacy officers to specify that some data should not be used for certain purposes. An important issue addressed in this article is the granularity of data labeling, i.e., the units of data with which purposes can be associated. We address this issue in the context of relational databases and propose four different labeling schemes, each providing a different granularity. We also propose an approach to represent purpose information, which results in low storage overhead, and we exploit query modification techniques to support access control based on purpose information. Another contribution of our work is that we address the problem of how to determine the purpose for which certain data are accessed by a given user. Our proposed solution relies on role-based access control (RBAC) models as well as the notion of conditional role which is based on the notions of role attribute and system attribute.


ieee symposium on security and privacy | 2007

A Critique of the ANSI Standard on Role-Based Access Control

Ninghui Li; Ji-Won Byun; Elisa Bertino

Vendors have widely adopted RBAC to manage user access to computer resources in various products, including database management systems. However, as this analysis shows, the standard is hindered by...


Lecture Notes in Computer Science | 2005

Privacy-Preserving database systems

Elisa Bertino; Ji-Won Byun; Ninghui Li

Privacy is today an important concern for both users and enterprises. Therefore, intense research is today being carried out on various aspects of privacy-preserving data management systems. In this paper, we focus on database management systems (DBMS) able to enforce privacy promises encoded in privacy languages such as P3P. In particular, in the paper, we first present an overview of the P3P language and outlines some of its critical aspects. We then outline the main requirements for a privacy-preserving DBMS and we discuss solutions related to the management of privacy-related meta-data, focusing on special category of meta-data information, that is, purpose information. Purpose information represents an important component of privacy statements and thus their effective management is crucial. We then discuss current solutions to to fine-grained access control in the context of relational database systems and identify relevant issues.


Journal of Computer Security | 2009

Privacy-preserving incremental data dissemination

Ji-Won Byun; Tiancheng Li; Elisa Bertino; Ninghui Li; Yonglak Sohn

Although the k-anonymity and e-diversity models have led to a number of valuable privacy-protecting techniques and algorithms, the existing solutions are currently limited to static data release. That is, it is assumed that a complete dataset is available at the time of data release. This assumption implies a significant shortcoming, as in many applications data collection is rather a continual process. Moreover, the assumption entails “one-time” data dissemination; thus, it does not adequately address todays strong demand for immediate and up-to-date information. In this paper, we consider incremental data dissemination, where a dataset is continuously incremented with new data. The key issue here is that the same data may be anonymized and published multiple times, each of the time in a different form. Thus, static anonymization (i.e., anonymization which does not consider previously released data) may enable various types of inference. In this paper, we identify such inference issues and discuss some prevention methods.


symposium on access control models and technologies | 2006

Systematic control and management of data integrity

Ji-Won Byun; Yonglak Sohn; Elisa Bertino

Integrity has long been considered a fundamental requirement for secure computerized systems, and especially todays demand for data integrity is stronger than ever as many organizations are in-creasing their reliance on data and information systems. A number of recently enacted data privacy regulations also require high in-tegrity for personal data. In this paper, we discuss various issues concerning systematic control and management of data integrity with a primary focus on access control. We first examine some previously proposed integrity models and define a set of integrity requirements. We then present an architecture for comprehensive integrity control systems, which has its basis on data validation and metadata management. We also provide an integrity control policy language that we believe is flexible and intuitive.


siam international conference on data mining | 2006

Secure anonymization for incremental datasets

Ji-Won Byun; Yonglak Sohn; Elisa Bertino; Ninghui Li


Archive | 2006

EFFICIENT K-ANONYMITY USING CLUSTERING TECHNIQUE

Ji-Won Byun; Ashish Kamra; Elisa Bertino; Ninghui Li


annual information security symposium | 2010

TIAMAT: a tool for interactive analysis of microdata anonymization techniques

Chenyun Dai; Gabriel Ghinita; Elisa Bertino; Ji-Won Byun; Ninghui Li

Collaboration


Dive into the Ji-Won Byun's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Gabriel Ghinita

University of Massachusetts Boston

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge