Privacy preserving access control policy and algorithms for conflicting problems
Paper
Paper/Presentation Title | Privacy preserving access control policy and algorithms for conflicting problems |
---|---|
Presentation Type | Paper |
Authors | Sun, Lili (Author), Wang, Hua (Author), Tao, Xiaohui (Author), Zhang, Yanchun (Author) and Yang, Jing (Author) |
Editors | Kellenberger, Patrick |
Journal or Proceedings Title | Proceedings of the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011) |
ERA Conference ID | 43091 |
Number of Pages | 8 |
Year | 2011 |
Place of Publication | Los Alamitos, CA. United States |
ISBN | 9781457721359 |
Digital Object Identifier (DOI) | https://doi.org/10.1109/TrustCom.2011.34 |
Web Address (URL) of Paper | http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6120826 |
Conference/Event | 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011) |
IEEE/IFIP International Symposium on Trusted Computing and Communications | |
Event Details | IEEE/IFIP International Symposium on Trusted Computing and Communications TrustCom Rank A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A |
Event Details | 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011) Parent IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) Delivery In person Event Date 16 to end of 18 Nov 2011 Event Location Changsha, China |
Abstract | This paper proposes a framework for privacy preserving access control policies and mechanisms, and describes algorithms for access policy conflicting problems. The mechanism enforces access policy to data containing personally identifiable information. The key component of the framework is purpose involved access control models (PAC) that provide full support for expressing highly complex privacy-related policies, taking into account features like purposes, conditions and obligations. Policy conflicting problems may arise when new access policies are generated that are possible to be conflicted to existing policies. As a result of the policy conflicts, private information cannot be well protected. The structure of access control policy including conditions and obligations is studied. Based on the access policy, authorization models and policy operations are analysed. Finally comparisons to related works EPAL are presented. |
Keywords | access control; conflicts; personally identifiable information; policy conflict; privacy preserving; private information |
ANZSRC Field of Research 2020 | 460401. Cryptography |
460499. Cybersecurity and privacy not elsewhere classified | |
460908. Information systems organisation and management | |
Public Notes | © 2011 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |
Byline Affiliations | Department of Mathematics and Computing |
Chinese Academy of Sciences, China | |
Institution of Origin | University of Southern Queensland |
https://research.usq.edu.au/item/q12zx/privacy-preserving-access-control-policy-and-algorithms-for-conflicting-problems
1845
total views284
total downloads5
views this month0
downloads this month