Privacy Enhanced Authorizations and Data Handling
نویسندگان
چکیده
The protection of privacy is an increasing concern in today’s global infrastructure. Many research efforts have been therefore devoted to the development of privacy protecting technology. In particular, as an important step for helping users to maintain control over the use of their personal information, current access control solutions have to be enriched with the ability of supporting privacy requirements. In this position paper, we outline some emerging requirements and R&D challenges of privacy protection related to access control and discuss how they should be addressed in the framework of a comprehensive approach to privacy-aware access control .
منابع مشابه
Data Handling: Dependencies between Authorizations and Obligations
Authorizations and obligations are keystones of data handling. On one hand there are ambiguous links between authorization and obligations. On the other hand a clear separation between both concepts is necessary to improve readability and to avoid inconsistencies. This position paper focuses on authorizations necessary to enforce obligations. Such authorizations are necessary to prevents overdi...
متن کاملPrivacy-preserving Personal Information Management
The spread of Information and Communication Technologies (ICTs) has transformed the way we deliver services, and has made them in general more efficient and more accessible to users. With these improvements however came new challenges. The extensive use of electronic services in our daily life, and the massive gathering of transactional data have led to serious privacy violations. In this thesi...
متن کاملProviding flexibility in information flow control for object oriented systems
This paper presents an approach to control information flow in object-oriented systems that takes into account, besides authorizations on objects, also how the information has been obtained and/or transmitted. These aspects are considered by allowing exceptions to the restrictions stated by the authorizations. Exceptions are specified by means of waivers associated with methods. Two kinds of wa...
متن کاملA Uniform Indexing Scheme for Geo-spatial Data and Authorizations
High-resolution satellites are promising technologies to bolster global transparency by providing unprecedented access to accurate and timely information. A significant number in this satellite fleet are owned by private organizations, which can collect images of human activities and the environment, and make them commercially available around the globe. Uncontrolled dissemination of this infor...
متن کاملA Logical Language for Expressing Authorizations
A major drawback of existing access control systems is that they have all been developed with a specific access control policy in mind. This means that all protection requirements (i.e., accesses to be allowed or denied) must be specified in terms of the policy enforced by the system. While this may be trivial for some requirements, specification of other requirements may become quite complex o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006