Technological innovations like social networks, personal devices and cloud computing, allow users to share and store online a huge amount of personal data. Sharing personal data online raises significant privacy concerns for users, who feel that they do not have full control over their data. A solution often proposed to alleviate users' privacy concerns is to let them specify access control policies that reflect their privacy constraints. However, existing approaches to access control often produce policies which either are too restrictive or allow the leakage of sensitive information. In this paper, we present a novel access control model that reduces the risk of information leakage. The model relies on a data model which encodes the domai...
Traditional techniques of enforcing an access control policy rely on an honest reference monitor to ...
Especially in biomedical research, individual-level data must be protected due to the sensitivity of...
International audienceWith more and more information being exchanged or published on the Web or in p...
Technological innovations like social networks, personal devices and cloud computing, allow users to...
Technological innovations like social networks, personal devices and cloud computing, allow users to...
Current proposals for access control languages cannot specify policies required by specific applicat...
Increasing amounts of data are being collected and stored relating to every aspect of an individual'...
Some software applications are developed to collect, store, and manage users\u27 personal, medical, ...
In this article, we introduce a comprehensive framework supporting a privacy-aware access control me...
Pervasive computing and Internet of Things (IoT) have recently received considerable interest to dep...
Organizational Information Systems (IS) collect, store, and manage personal and business data. Due t...
Abstract. Traditional access control models often assume that the en-tity enforcing access control p...
This chapter presents the results of the research on how the current standards for access control po...
With the widespread use of web services, there is a need for adequate security and privacy support t...
Traditional techniques of enforcing an access control policy rely on an honest reference monitor to ...
Especially in biomedical research, individual-level data must be protected due to the sensitivity of...
International audienceWith more and more information being exchanged or published on the Web or in p...
Technological innovations like social networks, personal devices and cloud computing, allow users to...
Technological innovations like social networks, personal devices and cloud computing, allow users to...
Current proposals for access control languages cannot specify policies required by specific applicat...
Increasing amounts of data are being collected and stored relating to every aspect of an individual'...
Some software applications are developed to collect, store, and manage users\u27 personal, medical, ...
In this article, we introduce a comprehensive framework supporting a privacy-aware access control me...
Pervasive computing and Internet of Things (IoT) have recently received considerable interest to dep...
Organizational Information Systems (IS) collect, store, and manage personal and business data. Due t...
Abstract. Traditional access control models often assume that the en-tity enforcing access control p...
This chapter presents the results of the research on how the current standards for access control po...
With the widespread use of web services, there is a need for adequate security and privacy support t...
Traditional techniques of enforcing an access control policy rely on an honest reference monitor to ...
Especially in biomedical research, individual-level data must be protected due to the sensitivity of...
International audienceWith more and more information being exchanged or published on the Web or in p...