A privacy-aware access control system

CA Ardagna, M Cremonini… - Journal of …, 2008 - content.iospress.com
The protection of privacy is an increasing concern in our networked society because of the
growing amount of personal information that is being collected by a number of commercial …

Towards privacy-enhanced authorization policies and languages

CA Ardagna, E Damiani… - Data and Applications …, 2005 - Springer
The protection of privacy in today's global infrastructure requires the combined application
solution from technology (technical measures), legislation (law and public policy), and …

[PDF][PDF] Access control is an inadequate framework for privacy protection

L Kagal, H Abelson - W3C Privacy Workshop, 2010 - Citeseer
As Web architects, we might all agree on the need to protect privacy. But what is it that we
want to protect? In Brandeis and Warren's classic legal study [19], privacy is defined as the …

Access control for security and privacy in ubiquitous computing environments

S Yamada, E Kamioka - IEICE transactions on communications, 2005 - search.ieice.org
Ubiquitous computing (ubicomp) demands new security and privacy enhancing
technologies for the new information and communication environments where a huge …

A role-involved purpose-based access control model

ME Kabir, H Wang, E Bertino - Information Systems Frontiers, 2012 - Springer
This paper presents a role-involved purpose-based access control (RPAC) model, where a
conditional purpose is defined as the intention of data accesses or usages under certain …

Privacy-aware role-based access control

Q Ni, E Bertino, J Lobo, SB Calo - IEEE Security & Privacy, 2009 - ieeexplore.ieee.org
A privacy-aware role-based access control model extends RBAC to express highly complex
privacy-related policies, including consideration of such features as conditions and …

Privacy-enhanced, attack-resilient access control in pervasive computing environments with optional context authentication capability

K Ren, W Lou - Mobile Networks and Applications, 2007 - Springer
In pervasive computing environments (PCEs), privacy and security are two important but
contradictory objectives. Users enjoy services provided in PCEs only after their privacy …

Fine-grained access control of personal data

T Wang, M Srivatsa, L Liu - Proceedings of the 17th ACM symposium on …, 2012 - dl.acm.org
The immensity and variety of personal information (eg, profile, photo, and microblog) on
social sites require access control policies tailored to individuals' privacy needs. Today such …

Client-side access control enforcement using trusted computing and pei models

R Sandhu, X Zhang, K Ranganathan… - Journal of High …, 2006 - content.iospress.com
It has been recognized for some time that software alone does not provide an adequate
foundation for building a high-assurance trusted platform. The emergence of industry …

A survey on access control deployment

V Suhendra - … : International Conference, SecTech 2011, Held as Part …, 2011 - Springer
Access control is a security aspect whose requirements evolve with technology advances
and, at the same time, contemporary social contexts. Multitudes of access control models …