Role-Based Access Control Models
Computer
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
Privacy in information technology: designing to enable privacy policy management in organizations
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Purpose based access control for privacy protection in relational database systems
The VLDB Journal — The International Journal on Very Large Data Bases
Handbook of Satisfiability: Volume 185 Frontiers in Artificial Intelligence and Applications
Handbook of Satisfiability: Volume 185 Frontiers in Artificial Intelligence and Applications
Privacy-aware role-based access control
ACM Transactions on Information and System Security (TISSEC)
Personalizing access control by generalizing access control
Proceedings of the 15th ACM symposium on Access control models and technologies
A comprehensive privacy-aware authorization framework founded on HIPAA privacy rules
Proceedings of the 1st ACM International Health Informatics Symposium
Enabling Privacy-preserving Credential-based Access Control with XACML and SAML
CIT '10 Proceedings of the 2010 10th IEEE International Conference on Computer and Information Technology
Conditional privacy-aware role based access control
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Hi-index | 0.00 |
New access control models have been developed to accommodate the implementation of new privacy policies. One of these models is the P-RBAC model by Ni et al. [8] which supports a wide range of privacy policies. However, while modeling policies has become more complex, there has been only very limited support to verify the consistency of policies in an access control system. We extend the so-called condition component of the P-RBAC model to overcome some limitations on the expressive power of the model. Based on the extended P-RBAC model, we investigate an algorithm that detects conflicts and redundancies in the privacy policies.