Purpose based access control for privacy protection

نویسنده

  • Elisa Bertino
چکیده

Enforcement of the Sticky-policy requirement. Investigation of Fine-grained Access Control. <{G}, {T}> 94037 CA S. F. 9898 First Ave 1003 <{G}, > 46464 IL Chicago 433 State Road 1002 <{G}, {A, M}> 47907 IN W.Lafayette 232 Oval Drive 1001 addr_ip zip state city street c_id <{G}, {T}> [email protected] <{G}, > Jack <{G}, > 1003 <{G}, > [email protected] <{G}, > Paul <{G}, > 1002 <{P, S}, {M}> [email protected] <{G}, {M}> John <{G}, > 1001 email_ip email name_ip name c_id_ip c_id Data + IP Labels Requirements & Privacy Laws Privacy Policies Purpose Tree

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy Enforcement with an Extended Role-Based Access Control Model

Privacy enforcement has been one of the most important challenges in IT area. Current privacy practices within companies and organizations, e.g. enabling a P3P compliant policy, incorporating a privacy seal program, etc., cannot truly protect consumer privacy. Privacy protection can only be achieved by enforcing privacy policies within an organization’s online and offline data processing system...

متن کامل

An Architecture for Security and Protection of Big Data

The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...

متن کامل

Credential Purpose-based Access Control for Personal Data Protection

Web-based applications enable users to carry out their business transactions virtually at any time and place whereby users are required to disclose almost all their personal information which result in greater risks of information disclosure. Therefore, protecting personal information is of utmost importance. Enforcing personal information protection in databases requires controlled access to s...

متن کامل

Conditional Purpose Based Access Control Model for Privacy Protection

This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited purpose in the model. It allows users using some data for certain purpose with conditions. The structure of conditional purpose based access control model is defined and investigated through a practical paradigm with ac...

متن کامل

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004