Traditional techniques of enforcing an access control policy rely on an honest reference monitor to enforce the policy. However, for applications where the resources are sensitive, the access control policy might also be sensitive. As a result, an honest-but-curious reference monitor would glean some interesting information from the requests that it processes. For example if a requestor in a role psychiatrist is granted access to a document, the patient associated with that document probably has a psychiatric problem. The patient would consider this sensitive in- formation, and she might prefer the honest-but-curious reference monitor to remain oblivious of her mental problem. We present a high level framework for querying and enforcing a r...
Data privacy is one of the fundamental needs of the people. In a computing environment, there are va...
Abstract. This paper proposes a purpose-based framework for support-ing privacy preserving access co...
The enforcement of sensitive policies in untrusted environments is still an open challenge for polic...
Cryptographic access control offers selective access to encrypted data via a combination of key mana...
This thesis examines a new approach to attribute-based access control with hidden policies and hidde...
This paper proposes a purpose-based access control model in distributed computing environment for pr...
Abstract—In an open environment such as the Internet, the decision to collaborate with a stranger (e...
Cryptographic access control promises to offer easily distributed trust and broader applicability, w...
Outsourcing data storage reduces the cost of ownership. However, once data is stored on a remote ser...
Technological innovations like social networks, personal devices and cloud computing, allow users to...
Access control systems safeguard the touchy information's from unauthenticated clients. Be that as i...
In this paper, we follow the line of existing study on cryptographic enforcement of Role-Based Acces...
Current access control models typically assume that resources are under the strict custody of a trus...
In this article, we introduce a comprehensive framework supporting a privacy-aware access control me...
Part 6: Privacy ProtectionInternational audienceEnterprises collect and use private information for ...
Data privacy is one of the fundamental needs of the people. In a computing environment, there are va...
Abstract. This paper proposes a purpose-based framework for support-ing privacy preserving access co...
The enforcement of sensitive policies in untrusted environments is still an open challenge for polic...
Cryptographic access control offers selective access to encrypted data via a combination of key mana...
This thesis examines a new approach to attribute-based access control with hidden policies and hidde...
This paper proposes a purpose-based access control model in distributed computing environment for pr...
Abstract—In an open environment such as the Internet, the decision to collaborate with a stranger (e...
Cryptographic access control promises to offer easily distributed trust and broader applicability, w...
Outsourcing data storage reduces the cost of ownership. However, once data is stored on a remote ser...
Technological innovations like social networks, personal devices and cloud computing, allow users to...
Access control systems safeguard the touchy information's from unauthenticated clients. Be that as i...
In this paper, we follow the line of existing study on cryptographic enforcement of Role-Based Acces...
Current access control models typically assume that resources are under the strict custody of a trus...
In this article, we introduce a comprehensive framework supporting a privacy-aware access control me...
Part 6: Privacy ProtectionInternational audienceEnterprises collect and use private information for ...
Data privacy is one of the fundamental needs of the people. In a computing environment, there are va...
Abstract. This paper proposes a purpose-based framework for support-ing privacy preserving access co...
The enforcement of sensitive policies in untrusted environments is still an open challenge for polic...