Abstract. This paper proposes a purpose-based framework for support-ing privacy preserving access control policies and mechanisms. The mech-anism enforces access policy to data containing personally identifiable information. The key component of the framework is purpose involved access control models (PAC) that provide full support for expressing highly complex privacy-related policies, taking into account features like purposes and conditions. A policy refers to an access right that a subject can have on an object, based on attribute predicates, obligation actions, and system conditions. Policy conflicting problems may arise when new access policies are generated. The structure of purpose involved access control policy is studied, and effi...
The protection of privacy is an increasing concern in our networked society because of the growing a...
Data privacy is one of the fundamental needs of the people. In a computing environment, there are va...
The increased awareness of the importance of data protection has made access control a relevant comp...
This paper proposes a purpose-based framework for supporting privacy preserving access control polic...
This paper proposes a purpose-based access control model in distributed computing environment for pr...
This paper proposes a purpose-based access control model in distributed computing environment for pr...
There is often a misalignment between requirements for keeping data owners' information private and ...
Achieving privacy preservation in a data-sharing computing envi-ronment is becoming a challenging pr...
As privacy becomes a major concern for consumers and enterprises, many research have been focused o...
This paper presents a model for privacy preserving access control which is based on variety of purpo...
In this article, we introduce a comprehensive framework supporting a privacy-aware access control me...
This paper presents a role-involved purpose-based access control (RPAC) model, where a conditional p...
Abstract—This paper proposes a trust involved management framework for supporting privacy preserving...
As privacy becomes a major concern for consumers and enterprises, many research have been focused on...
This paper proposes a trust involved management framework for supporting privacy preserving access c...
The protection of privacy is an increasing concern in our networked society because of the growing a...
Data privacy is one of the fundamental needs of the people. In a computing environment, there are va...
The increased awareness of the importance of data protection has made access control a relevant comp...
This paper proposes a purpose-based framework for supporting privacy preserving access control polic...
This paper proposes a purpose-based access control model in distributed computing environment for pr...
This paper proposes a purpose-based access control model in distributed computing environment for pr...
There is often a misalignment between requirements for keeping data owners' information private and ...
Achieving privacy preservation in a data-sharing computing envi-ronment is becoming a challenging pr...
As privacy becomes a major concern for consumers and enterprises, many research have been focused o...
This paper presents a model for privacy preserving access control which is based on variety of purpo...
In this article, we introduce a comprehensive framework supporting a privacy-aware access control me...
This paper presents a role-involved purpose-based access control (RPAC) model, where a conditional p...
Abstract—This paper proposes a trust involved management framework for supporting privacy preserving...
As privacy becomes a major concern for consumers and enterprises, many research have been focused on...
This paper proposes a trust involved management framework for supporting privacy preserving access c...
The protection of privacy is an increasing concern in our networked society because of the growing a...
Data privacy is one of the fundamental needs of the people. In a computing environment, there are va...
The increased awareness of the importance of data protection has made access control a relevant comp...