systems. In Proceedings of International Conference 
on Cloud Security Management (ICCSM’13). 
Guimarães, Portugal. 
Bettini, C. et al., 2003. Provisions and Obligations in 
Policy Rule Management. Journal of Network and 
Systems Management, 11(3), pp.351–372. 
Byun, J. & Li, N., 2008. Purpose based access control for 
privacy protection in relational database systems. The 
VLDB Journal, pp.603–619. 
Choenni, S. et al., 2016. Privacy and security in smart data 
collection by citizens. In J. R. Gil-Garcia, T. A. Pardo, 
& T. Nam, eds. Smarter as the New Urban Agenda. 
Springer, pp. 349–366. 
Choenni, S., Dijk, J. van & Leeuw, F., 2010. Preserving 
privacy whilst integrating data: Applied to criminal 
justice. Information Polity, 15(1–2), pp.125–138. 
Colombo, P. & Ferrari, E., 2014. Enforcing obligations 
within relational database management systems. IEEE 
Transactions on Dependable and Secure Computing, 
pp.1–14. 
Dawes, S.S., 2010a. Information Policy Meta-Principles: 
Stewardship and Usefulness R. H. Sprague  Jr., ed. 
Proceedings of the 43rd Hawaii International 
Conference on System Sciences (HICSS-43), pp. 1–10. 
Dawes, S.S., 2010b. Stewardship and usefulness: Policy 
principles for information-based transparency. 
Government Information Quarterly, 27(4), pp.377–
383. 
Fung, B.C.M. et al., 2010. Privacy-preserving data 
publishing. ACM Computing Surveys, 42(4), pp.1–53. 
Gama, P., Ribeiro, C. & Ferreira, P., 2006. Heimdhal: A 
History-based Policy Engine for Grids. In Sixth IEEE 
International Symposium on In Cluster Computing 
and the Grid (CCGRID). 
Hilty, M., Basin, D. & Pretschner, A., 2005. On 
obligations.  Computer Security–ESORICS 2005, 
pp.98–117. 
Karr, A.F. et al., 2007. Secure, privacy-preserving analysis 
of distributed databases. Technometrics, 49(3), 
pp.335–345. 
Katt, B. et al., 2008. A general obligation model and 
continuity: enhanced policy enforcement engine for 
usage control. Proceedings of the 13th ACM 
symposium on Access control models and technologies 
(SACMAT ’08), pp.123–132. 
Kosinski, M., Stillwell, D. & Graepel, T., 2013. Private 
traits and attributes are predictable from digital records 
of human behavior. Proceedings of the National 
Academy of Sciences of the United States of America, 
110(15), pp.5802–5. 
Laur, S., Talviste, R. & Willemson, J., 2013. From 
oblivious AES to efficient and secure database join in 
the multiparty setting. Lecture Notes in Computer 
Science (including subseries Lecture Notes in 
Artificial Intelligence and Lecture Notes in 
Bioinformatics), 7954 LNCS, pp.84–101. 
Lazouski, A., Martinelli, F. & Mori, P., 2010. Usage 
control in computer security: A survey. Computer 
Science Review, 4(2), pp.81–99. 
Lopez, J., Oppliger, R. & Pernul, G., 2004. Authentication 
and authorization infrastructures (AAIs): a 
comparative survey. Computers & Security, 23(7), 
pp.578–590. 
de Montjoye, Y.-A. et al., 2013. Unique in the Crowd: The 
privacy bounds of human mobility. Scientific reports, 
3, p.1376. 
Narayanan, A. & Shmatikov, V., 2008. Robust de-
anonymization of large sparse datasets open datasets. 
In IEEE Symposium on Security and Privacy (SP’08). 
pp. 111–125. 
Ni, Q., Bertino, E. & Lobo, J., 2008. An obligation model 
bridging access control policies and privacy policies. 
Proceedings of the 13th ACM symposium on Access 
control models and technologies - SACMAT’08, p.133. 
Park, J. & Sandhu, R., 2004. The UCON ABC usage 
control model. ACM Transactions on Information and 
System …, 7(1), pp.128–174. 
Sandhu, R. & Park, J., 2003. Usage Control : A Vision for 
Next Generation Access Control. , pp.17–31. 
Sankar, L., Rajagopalan, S. & Poor, H., 2013. Utility-
Privacy Tradeoff in Databases: An Information-
theoretic Approach. IEEE Transactions on 
Information Forensics and Security, pp.1–1. 
Verheul, E. et al., 2016. Polymorphic Encryption and 
Pseudonymisation for Personalised Healthcare, 
Available at: 
https://www.semanticscholar.org/paper/Polymorphic-
Encryption-and-Pseudonymisation-for-Verheul-
Jacobs/7dfce578644bc101ae4ffcd0184d2227c6d07809
. 
Wang, W., Ying, L. & Zhang, J., 2014. On the relation 
between identifiability, differential privacy and 
mutual-information privacy. In In 52nd IEEE Annual 
Allerton Conference on Communication, Control, and 
Computing (Allerton). pp. 1086–1092. Available at: 
http://arxiv.org/abs/1402.3757. 
Zhang, X. et al., 2005. Formal model and policy 
specification of usage control. ACM Transactions on 
Information and System Security, 8(4), pp.351–387.