Q Ni, E Bertino, J Lobo, C Brodie, CM Karat… - ACM Transactions on …, 2010 - dl.acm.org
In this article, we introduce a comprehensive framework supporting a privacy-aware access control mechanism, that is, a mechanism tailored to enforce access control to data …
X Zhang, F Parisi-Presicce, R Sandhu… - ACM Transactions on …, 2005 - dl.acm.org
The recent usage control model (UCON) is a foundation for next-generation access control models with distinguishing properties of decision continuity and attribute mutability. A usage …
P Guarda, N Zannone - Information and Software Technology, 2009 - Elsevier
Privacy and data protection are pivotal issues in nowadays society. They concern the right to prevent the dissemination of sensitive or confidential information of individuals. Many …
Access control models describe frameworks that dictate how subjects (eg users) access resources. In the role-based access control (RBAC) model access to resources is based on …
MJ May, CA Gunter, I Lee - 19th IEEE Computer Security …, 2006 - ieeexplore.ieee.org
There is a growing interest in establishing rules to regulate the privacy of citizens in the treatment of sensitive personal data such as medical and financial records. Such rules must …
K Irwin, T Yu, WH Winsborough - … of the 13th ACM conference on …, 2006 - dl.acm.org
Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the …
X Zhang, J Park, F Parisi-Presicce… - Proceedings of the ninth …, 2004 - dl.acm.org
Recently presented usage control (UCON) has been considered as the next generation access control model with distinguishing properties of decision continuity and attribute …
R Hull, B Kumar, D Lieuwen… - … on Mobile Data …, 2004 - ieeexplore.ieee.org
This paper provides detail on two key components of the Houdini framework under development at Bell Labs, that enable context-aware and privacy-conscious user data …
The protection of privacy is an increasing concern in our networked society because of the growing amount of personal information that is being collected by a number of commercial …