Toward a multilevel secure relational data model
SIGMOD '91 Proceedings of the 1991 ACM SIGMOD international conference on Management of data
Database security: research and practice
Information Systems
Role-Based Access Control Models
Computer
Constraints for role-based access control
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
Towards a more complete model of role
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
The multilevel relational (MLR) data model
ACM Transactions on Information and System Security (TISSEC)
The NIST model for role-based access control: towards a unified standard
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
Personalized hypermedia and international privacy
Communications of the ACM - The Adaptive Web
Context sensitivity in role-based access control
ACM SIGOPS Operating Systems Review
Benchmarking Database Systems A Systematic Approach
VLDB '83 Proceedings of the 9th International Conference on Very Large Data Bases
Interactive deduplication using active learning
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Access control in a relational data base management system by query modification
ACM '74 Proceedings of the 1974 annual conference - Volume 1
Role-Based Access Control
Privacy Promises, Access Control, and Privacy Management
ISEC '02 Proceedings of the Third International Symposium on Electronic Commerce
Flexible access control policy specification with constraint logic programming
ACM Transactions on Information and System Security (TISSEC)
Reference reconciliation in complex information spaces
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Limiting disclosure in hippocratic databases
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Platform for enterprise privacy practices: privacy-enabled management of customer data
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Privacy-aware role based access control
Proceedings of the 12th ACM symposium on Access control models and technologies
A threat-based privacy preservation system in untrusted environment
Proceedings of the 2009 International Conference on Hybrid Information Technology
On the operational semantics of rights expression languages
Proceedings of the nineth ACM workshop on Digital rights management
Enforcing purpose of use via workflows
Proceedings of the 8th ACM workshop on Privacy in the electronic society
Privacy-aware role-based access control
ACM Transactions on Information and System Security (TISSEC)
A purpose-based privacy-aware system using privacy data graph
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
Conditional purpose based access control model for privacy protection
ADC '09 Proceedings of the Twentieth Australasian Conference on Australasian Database - Volume 92
A conditional purpose-based access control model with dynamic roles
Expert Systems with Applications: An International Journal
A comprehensive privacy-aware authorization framework founded on HIPAA privacy rules
Proceedings of the 1st ACM International Health Informatics Symposium
Extending XACML access control architecture for allowing preference-based authorisation
TrustBus'10 Proceedings of the 7th international conference on Trust, privacy and security in digital business
MyABDAC: compiling XACML policies for attribute-based database access control
Proceedings of the first ACM conference on Data and application security and privacy
Capturing P3P semantics using an enforceable lattice-based structure
Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society
Mixing privacy with role-based access control
Proceedings of The Fourth International C* Conference on Computer Science and Software Engineering
Purpose control: did you process the data for the intended purpose?
SDM'11 Proceedings of the 8th VLDB international conference on Secure data management
A novel Threat Evaluation method for privacy-aware system in RFID
International Journal of Ad Hoc and Ubiquitous Computing
A contextual privacy-aware access control model for network monitoring workflows: work in progress
FPS'11 Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security
A role-involved purpose-based access control model
Information Systems Frontiers
Privacy analysis in mobile social networks: the influential factors for disclosure of personal data
International Journal of Wireless and Mobile Computing
A privacy preserving model bridging data provider and collector preferences
Proceedings of the Joint EDBT/ICDT 2013 Workshops
The influential factors for the variation of data sensitivity in ubiquitous social networking
International Journal of Wireless and Mobile Computing
Consistency checking in privacy-aware access control
Proceedings of the 51st ACM Southeast Conference
A privacy-aware access control model for distributed network monitoring
Computers and Electrical Engineering
Consistency checking in access control
Proceedings of the 4th ACM conference on Data and application security and privacy
XML privacy protection model based on cloud storage
Computer Standards & Interfaces
Hi-index | 0.00 |
In this article, we present a comprehensive approach for privacy preserving access control based on the notion of purpose. In our model, purpose information associated with a given data element specifies the intended use of the data element. A key feature of our model is that it allows multiple purposes to be associated with each data element and also supports explicit prohibitions, thus allowing privacy officers to specify that some data should not be used for certain purposes. An important issue addressed in this article is the granularity of data labeling, i.e., the units of data with which purposes can be associated. We address this issue in the context of relational databases and propose four different labeling schemes, each providing a different granularity. We also propose an approach to represent purpose information, which results in low storage overhead, and we exploit query modification techniques to support access control based on purpose information. Another contribution of our work is that we address the problem of how to determine the purpose for which certain data are accessed by a given user. Our proposed solution relies on role-based access control (RBAC) models as well as the notion of conditional role which is based on the notions of role attribute and system attribute.