Posted: January 1, 2014 | Author: Thomas A. Schultz | Filed under: 3.4 Data Privacy, Security, and Consent Management | Tags: C32, data, data access consent, data privacy, data security, Divine Inspirations, graph theory, information, knowledge, ontology, social network ontology, soft schema, subsumption, TCSQL | Leave a comment
Presentation Overview: This presentation describes how to manage data privacy, security, and consent. Determining who has access to data and what data they can access is an enormous industry-wide problem. This presentation demonstrates a clever use of ontologies in providing an elegant solution to this problem.
Slide Presentation: Data Privacy, Security, and Consent Management
Prerequisite Video Presentation: Support of OOP Directly in a RDBMS
Demonstration: Data Privacy, Security, and Consent
Demonstration: Social Network
