Email\ud Print\ud Request Permissions\ud Systems for allowing users to manage access to their personal data are important for a wide variety of applications including healthcare, where authorised individuals may need to share information in ways that the owner had not anticipated. Simply denying access in unknown cases may hamper critical decisions and affect service delivery. Rather, decisions can be made considering the risk of a given sharing request, and the trustworthiness of the requester. We propose a trust- and risk-aware access control mechanism (TRAAC) and a sparse zone-based policy model, which together allow decision-making on the basis of the requester's trustworthiness with regards to both the information to be shared, and the...
Abstract. In this paper, trust-based recommendations control the exchange of personal information be...
International audienceThe first challenge that we tackle in this paper is how to conduct access cont...
Summary The security of access and information flow carries with it the risk that resources will be ...
Systems for allowing users to manage access to their personal data are important for a wide variety ...
The increasing need to share information in dynamic environments has created a requirement for risk-...
Abstract—Over the years, role based access control (RBAC) has remained a dominant form of access con...
The increasing need to share information in dynamic environments has created a requirement for risk-...
Technological innovations like social networks, personal devices and cloud computing, allow users to...
With development of grid technology, sensitive data protection becomes a difficult task for accesses...
Technological innovations like social networks, personal devices and cloud computing, allow users to...
The prevailing trend of the seamless digital collec-tion has prompted privacy concerns to the organi...
With the development of grid technology, sensitive files and data protection become difficult tasks ...
Risk-aware access control systems grant or deny access to resources based on the notion of risk. It ...
Current proposals for access control languages cannot specify policies required by specific applicat...
AbstractDifferent from traditional access control technologies, such as discretionary access control...
Abstract. In this paper, trust-based recommendations control the exchange of personal information be...
International audienceThe first challenge that we tackle in this paper is how to conduct access cont...
Summary The security of access and information flow carries with it the risk that resources will be ...
Systems for allowing users to manage access to their personal data are important for a wide variety ...
The increasing need to share information in dynamic environments has created a requirement for risk-...
Abstract—Over the years, role based access control (RBAC) has remained a dominant form of access con...
The increasing need to share information in dynamic environments has created a requirement for risk-...
Technological innovations like social networks, personal devices and cloud computing, allow users to...
With development of grid technology, sensitive data protection becomes a difficult task for accesses...
Technological innovations like social networks, personal devices and cloud computing, allow users to...
The prevailing trend of the seamless digital collec-tion has prompted privacy concerns to the organi...
With the development of grid technology, sensitive files and data protection become difficult tasks ...
Risk-aware access control systems grant or deny access to resources based on the notion of risk. It ...
Current proposals for access control languages cannot specify policies required by specific applicat...
AbstractDifferent from traditional access control technologies, such as discretionary access control...
Abstract. In this paper, trust-based recommendations control the exchange of personal information be...
International audienceThe first challenge that we tackle in this paper is how to conduct access cont...
Summary The security of access and information flow carries with it the risk that resources will be ...