Role-Based Access Control Models
Computer
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
The NIST model for role-based access control: towards a unified standard
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Protecting Respondents' Identities in Microdata Release
IEEE Transactions on Knowledge and Data Engineering
A Model for Team-based Access Control (TMAC 2004)
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
L-diversity: Privacy beyond k-anonymity
ACM Transactions on Knowledge Discovery from Data (TKDD)
Context obfuscation for privacy via ontological descriptions
LoCA'05 Proceedings of the First international conference on Location- and Context-Awareness
Hi-index | 0.00 |
Context data in context-aware ubiquitous systems usually have private information for customized services. Although access control systems may be used to prevent unpermitted subjects from accessing private data, it would also stop execution of useful customized services. To solve this problem, this paper suggests a method of abstracting context data which enables data owners to deliver less detailed information to data requesters. With a set of intelligent RDF schema, inference rule and negotiation document, it can avoid providing excessive data and can keep service continuity.