Purpose based access control of complex data for privacy protection
Proceedings of the tenth ACM symposium on Access control models and technologies
Beyond purpose-based privacy access control
ADC '07 Proceedings of the eighteenth conference on Australasian database - Volume 63
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Limiting disclosure in hippocratic databases
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Person-Wise privacy level access control for personal information directory services
EUC'06 Proceedings of the 2006 international conference on Embedded and Ubiquitous Computing
The architecture of a privacy-aware access control decision component
CASSIS'05 Proceedings of the Second international conference on Construction and Analysis of Safe, Secure, and Interoperable Smart Devices
An architecture for privacy-aware inter-domain identity management
DSOM'05 Proceedings of the 16th IFIP/IEEE Ambient Networks international conference on Distributed Systems: operations and Management
Conditional privacy-aware role based access control
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Modeling and Respecting Privacy Specification when Composing DaaS Services*
International Journal of Web Services Research
Hi-index | 0.00 |
As users are participating in various social contexts, some projects such as MobiLife and MyLifeBits are developing a facility to commence daily life service. This enables users to store all their daily events which can be collected using their mobile device. These data can be shared with other people or some service providers only if the user agrees. However, in the cases of inter-domain web service usage or sharing their data with others, there are some potential problems about privacy. To solve these problems, we propose a new method, privacy-aware access control through negotiation process (N-PAC). This method enables a user to accomplish self-determination and self-control of personal information in more realistic application environments.