As privacy becomes a major concern for consumers and enterprises, many research have been focused on the privacy protecting technology in recent years. In this paper, we present a comprehensive approach for usage access control based on the notion purpose. In our model, purpose information associated with a given data element specifies the intended use of the subjects and objects in the usage access control model. A key feature of our model is that it allows when an access is required, the access purpose is checked against the intended purposes for the data item. We propose an approach to represent purpose information to support access control based on purpose information. Our proposed solution relies on usage access control (UAC) models ...
One of the principles of privacy management is making use of purposes for indicating why data is sto...
Although database management systems (DBMSs) enforce access control according to a variety of models...
Information privacy becomes a major concern for customers to provide their private data that can pro...
As privacy becomes a major concern for consumers and enterprises, many research have been focused o...
As privacy becomes a major concern for consumers and enterprises, many research have been focused on...
Achieving privacy preservation in a data-sharing computing envi-ronment is becoming a challenging pr...
This paper presents a role-involved purpose-based access control (RPAC) model, where a conditional p...
This paper presents a model for privacy preserving access control which is based on variety of purpo...
This paper proposes a purpose-based framework for supporting privacy preserving access control polic...
There is often a misalignment between requirements for keeping data owners' information private and ...
Data purpose is a central concept to modeling privacy requirements for information systems. Existing...
Data purpose is a central concept to modeling privacy requirements for information systems. Existing...
Data privacy is one of the fundamental needs of the people. In a computing environment, there are va...
Privacy has been recognized to be a critical requirement in computing environments. To keep the priv...
This paper proposes a purpose-based access control model in distributed computing environment for pr...
One of the principles of privacy management is making use of purposes for indicating why data is sto...
Although database management systems (DBMSs) enforce access control according to a variety of models...
Information privacy becomes a major concern for customers to provide their private data that can pro...
As privacy becomes a major concern for consumers and enterprises, many research have been focused o...
As privacy becomes a major concern for consumers and enterprises, many research have been focused on...
Achieving privacy preservation in a data-sharing computing envi-ronment is becoming a challenging pr...
This paper presents a role-involved purpose-based access control (RPAC) model, where a conditional p...
This paper presents a model for privacy preserving access control which is based on variety of purpo...
This paper proposes a purpose-based framework for supporting privacy preserving access control polic...
There is often a misalignment between requirements for keeping data owners' information private and ...
Data purpose is a central concept to modeling privacy requirements for information systems. Existing...
Data purpose is a central concept to modeling privacy requirements for information systems. Existing...
Data privacy is one of the fundamental needs of the people. In a computing environment, there are va...
Privacy has been recognized to be a critical requirement in computing environments. To keep the priv...
This paper proposes a purpose-based access control model in distributed computing environment for pr...
One of the principles of privacy management is making use of purposes for indicating why data is sto...
Although database management systems (DBMSs) enforce access control according to a variety of models...
Information privacy becomes a major concern for customers to provide their private data that can pro...