The dining cryptographers problem: unconditional sender and recipient untraceability
Journal of Cryptology
Role-Based Access Control Models
Computer
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
SecureFlow: a secure Web-enabled workflow management system
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
An Integration Model of Role-Based Access Control and Activity Based Access Control Using Task
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
A Process of Abstracting T-RBAC Aspects from Enterprise Environment
DASFAA '01 Proceedings of the 7th International Conference on Database Systems for Advanced Applications
IT-security and privacy: design and use of privacy-enhancing security mechanisms
IT-security and privacy: design and use of privacy-enhancing security mechanisms
An adaptive privacy management system for data repositories
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Privacy-Aware Access Control through Negotiation in Daily Life Service
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
Hi-index | 0.00 |
This paper proposes a policy-based access control mechanism for the personal information directory service systems which prevents the information users from illegally accessing the personal information and enables the information subjects to control access to their own information. In the proposed mechanism, the individuals' personal information which is encrypted with different keys is stored into the directory repository. In order to control access to her own personal information, information subject sets up the access control policy for it and the access control is practiced out by providing encryption keys to the legal users according to the subject's policy