Purpose based access control for privacy protection
نویسنده
چکیده
Enforcement of the Sticky-policy requirement. Investigation of Fine-grained Access Control. <{G}, {T}> 94037 CA S. F. 9898 First Ave 1003 <{G}, > 46464 IL Chicago 433 State Road 1002 <{G}, {A, M}> 47907 IN W.Lafayette 232 Oval Drive 1001 addr_ip zip state city street c_id <{G}, {T}> [email protected] <{G}, > Jack <{G}, > 1003 <{G}, > [email protected] <{G}, > Paul <{G}, > 1002 <{P, S}, {M}> [email protected] <{G}, {M}> John <{G}, > 1001 email_ip email name_ip name c_id_ip c_id Data + IP Labels Requirements & Privacy Laws Privacy Policies Purpose Tree
منابع مشابه
Privacy Enforcement with an Extended Role-Based Access Control Model
Privacy enforcement has been one of the most important challenges in IT area. Current privacy practices within companies and organizations, e.g. enabling a P3P compliant policy, incorporating a privacy seal program, etc., cannot truly protect consumer privacy. Privacy protection can only be achieved by enforcing privacy policies within an organization’s online and offline data processing system...
متن کاملAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملCredential Purpose-based Access Control for Personal Data Protection
Web-based applications enable users to carry out their business transactions virtually at any time and place whereby users are required to disclose almost all their personal information which result in greater risks of information disclosure. Therefore, protecting personal information is of utmost importance. Enforcing personal information protection in databases requires controlled access to s...
متن کاملConditional Purpose Based Access Control Model for Privacy Protection
This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited purpose in the model. It allows users using some data for certain purpose with conditions. The structure of conditional purpose based access control model is defined and investigated through a practical paradigm with ac...
متن کاملAttribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کامل