Prioritized Execution of Privacy Policies

نویسندگان

  • Ilaria Matteucci
  • Paolo Mori
  • Marinella Petrocchi
چکیده

This paper addresses the issue of solving conflicts occurring in the authorization decision process among policies applicable to an access request. We propose a strategy for conflict resolution based on the evaluation of the specificity level of the elements constituting the policies. Operatively, the strategy is implemented by exploiting a well known decision making technique. Two practical examples of use in the healthcare scenario are given.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comparison of Prioritized Channel Allocation Policies in Cellular Radio Networks

Under cutoff and threshold priority policies, we mathematically formulate a prioritized channel allocation problem which is combinatorial in nature. We then reduce that problem using the concept of pattern, and apply a simulated annealing approach to the reduced problem. Computational experiments show that our method works very well and the cutoff priority policy outperforms the non-prioritized...

متن کامل

Action dynamics in multitasking: the impact of additional task factors on the execution of the prioritized motor movement

In multitasking, the execution of a prioritized task is in danger of crosstalk by the secondary task. Task shielding allows minimizing this crosstalk. However, the locus and temporal dynamics of crosstalk effects and further sources of influence on the execution of the prioritized task are to-date only vaguely understood. Here we combined a dual-task paradigm with an action dynamics approach an...

متن کامل

Investigating Similarity Between Privacy Policies of Social Networking Sites as a Precursor for Standardization

The current execution of privacy policies, as a mode of communicating information to users, is unsatisfactory. Social networking sites (SNS) exemplify this issue, attracting growing concerns regarding their use of personal data and its effect on user privacy. This demonstrates the need for more informative policies. However, SNS lack the incentives required to improve policies, which is exacerb...

متن کامل

Processor Allocation in Multiprogrammed Distributed-Memory Parallel Computer Systems

In this paper, we examine three general classes of space-sharing scheduling policies under a workload representative of large-scale scientific computing. These policies differ in the way processors are partitioned among the jobs as well as in the way jobs are prioritized for execution on the partitions. We consider new static, adaptive and dynamic policies that differ from previously proposed p...

متن کامل

Provenance-Aware Policy Definition and Execution

The processing of data is often restricted by contractual and legal requirements for protecting privacy and IPRs. In the Internet, policies provide means to control how and by whom data is processed. Conditions of policies may depend on the previous processing of the data and thus on the temporal structure of processing histories. However, existing policy languages do not provide means to expre...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012