Protection in operating systems
Communications of the ACM
Concepts for personal location privacy policies
Proceedings of the 3rd ACM conference on Electronic Commerce
Towards usage control models: beyond traditional access control
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
ACM SIGOPS Operating Systems Review
Design of a Role-Based Trust-Management Framework
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Protection: principles and practice
AFIPS '72 (Spring) Proceedings of the May 16-18, 1972, spring joint computer conference
Decentralized trust management
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Providing location privacy in assisted living environments
Proceedings of the 1st international conference on PErvasive Technologies Related to Assistive Environments
We saw each other on the subway: secure, anonymous proximity-based missed connections
Proceedings of the 10th workshop on Mobile Computing Systems and Applications
A Formal Privacy Management Framework
Formal Aspects in Security and Trust
SMILE: encounter-based trust for mobile social services
Proceedings of the 16th ACM conference on Computer and communications security
A dynamic privacy model for web services
Computer Standards & Interfaces
A moving-object index for efficient query processing with peer-wise location privacy
Proceedings of the VLDB Endowment
The architecture of a privacy-aware access control decision component
CASSIS'05 Proceedings of the Second international conference on Construction and Analysis of Safe, Secure, and Interoperable Smart Devices
Countering identity theft through digital uniqueness, location cross-checking, and funneling
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
A formal model of obfuscation and negotiation for location privacy
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Protecting privacy with the MPEG-21 IPMP framework
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Privacy sensitive location information systems in smart buildings
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Refinement checking for privacy policies
Science of Computer Programming
Hi-index | 0.00 |
There are a variety of well-known models for access control developed for purposes like formally modeling the access rights on files, databases, and web resources. However, the existing models provide an inadequate representation of a number of concepts that are important when modeling privacy rights in distributed systems. We present an analog of the access control matrix designed to model such concepts. Our formalism, which we call a privacy system, empashizes the management of data and actions that affect the privacy of subjects. We motivate privacy systems, describe them mathematically, and illustrate their value in an architecture based on Personal Digital Rights Management (PDRM), which uses DRM concepts as a foundation for the specification and negotiation of privacy rights. This illustration is carried out throuh a case study of a privacy-respecting system for location based services. Our prototype, which we call AdLoc, manages advertising interupts on PDAs based on their location as determined by WiFi sightings in accordance with contracts written in the DRM language XrML.