A Purpose Based Usage Access Control Model
نویسندگان
چکیده
As privacy becomes a major concern for consumers and enterprises, many research have been focused on the privacy protecting technology in recent years. In this paper, we present a comprehensive approach for usage access control based on the notion purpose. In our model, purpose information associated with a given data element specifies the intended use of the subjects and objects in the usage access control model. A key feature of our model is that it allows when an access is required, the access purpose is checked against the intended purposes for the data item. We propose an approach to represent purpose information to support access control based on purpose information. Our proposed solution relies on usage access control (UAC) models as well as the components which based on the notions of the purpose information used in subjects and objects. Finally, comparisons with related works are analyzed. Keywords—Purpose, privacy, access control, authorization
منابع مشابه
Privacy Preserving Dynamic Access Control Model with Access Delegation for eHealth
eHealth is the concept of using the stored digital data to achieve clinical, educational, and administrative goals and meet the needs of patients, experts, and medical care providers. Expansion of the utilization of information technology and in particular, the Internet of Things (IoT) in eHealth, raises various challenges, where the most important one is security and access control. In this re...
متن کاملA combination of semantic and attribute-based access control model for virtual organizations
A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing security mechanisms, and especially a suitable access control mechanism, which enforces the defined security policy is a necessary requirement in VOs. Since VO is a complex ...
متن کاملPurpose Based Access Control for Privacy Protection in E-Healthcare Services
Information privacy is a major concern in many areas and none more so than in healthcare. E-healthcare is the use of web-based systems to share and deliver information across the internet. The design of proper models for authorization and access control for e-Health system services is necessary in a large health service. Usage control has been considered as the next generation access control mo...
متن کاملAccess and Mobility Policy Control at the Network Edge
The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...
متن کاملEnhance the XML Documents Security using Web Services
An increasing amount of semi-structured data, XML has become fundamental to humans and programs. XML changed by the World Wide Web Consortium (w3c) is quickly emerging as a new standard language for semi-structured data representation and transfer on the Internet. XML documents usually hold private information that cannot be shared by all user communities. So securing XML data is becoming incre...
متن کامل