Managing privacy, trust, security, and context relationships using weighted graph representations

被引:0
|
作者
School of ITMS, University of Ballarat, P.O. Box 663, Ballarat, Vic. 3353, Australia [1 ]
机构
来源
WSEAS Trans. Inf. Sci. Appl. | 2006年 / 2卷 / 283-290期
关键词
Cryptography - Electronic communities - Security of data - Virtual reality;
D O I
暂无
中图分类号
学科分类号
摘要
Determining who has access to personal data is an ongoing problem facing information system entities. The establishment of trust and its representation for known and unknown entities within the system further complicates access control rights allocation. One unique solution is through the application of graph representation to aid in the identification and management of privacy, trust and security requirements. Graphs provide a much better mental map than would textual information. In this paper we use graphs to represent informational relations concerning trust levels between entities for privacy and security requirements.
引用
收藏
相关论文
共 18 条
  • [1] Managing information privacy - Developing a context for security and privacy standards convergence
    Robbins, Jim
    Sabo, John T.
    IEEE SECURITY & PRIVACY, 2006, 4 (04) : 92 - 95
  • [2] Using TPM to Ensure Security, Trust and Privacy (STP) in VANET
    Sumra, Irshad Ahmed
    Bin Hasbullah, Halabi
    Ab Manan, Jamalul-lail
    2015 5TH NATIONAL SYMPOSIUM ON INFORMATION TECHNOLOGY: TOWARDS NEW SMART WORLD (NSITNSW), 2015,
  • [3] Enhancing Security and Privacy in Certified Mail Systems Using Trust Domain Separation
    Tauber, Arne
    Roessler, Thomas
    INFORMATION SECURITY, 2011, 6531 : 152 - 158
  • [4] Security, Trust, and Privacy Management Framework in Cyber-Physical Systems using Blockchain
    Das, Debashis
    Banerjee, Sourav
    Chatterjee, Pushpita
    Ghosh, Uttam
    Biswas, Utpal
    Mansoor, Wathiq
    2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [5] Preserving Security and Privacy in IoT Using Machine Learning and Trust Management<bold> </bold>
    Kumar, Avinash
    Bhowmik, Trisha
    Sharma, Rohit
    Bhardwaj, Abhishek
    MICRO-ELECTRONICS AND TELECOMMUNICATION ENGINEERING, ICMETE 2021, 2022, 373 : 349 - 361
  • [6] A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography
    Rathore, Manjari Singh
    Poongodi, M.
    Saurabh, Praneet
    Lilhore, Umesh Kumar
    Bourouis, Sami
    Alhakami, Wajdi
    Osamor, Jude
    Hamdi, Mounir
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 102
  • [7] Secure System Architecture for Wide Area Surveillance Using Security, Trust and Privacy (STP) Framework
    Isa, Mohd Anuar Mat
    Hashim, Habibah
    Ab Manan, Jamalul-lail
    Mahmod, Ramlan
    Rohmad, Mohd Saufy
    Hamzah, Abdul Hafiz
    Hamzah, Meor Mohd Azreen Meor
    Mazalan, Lucyantie
    Othman, Hanunah
    Adnan, Lukman
    INTERNATIONAL SYMPOSIUM ON ROBOTICS AND INTELLIGENT SENSORS 2012 (IRIS 2012), 2012, 41 : 480 - 485
  • [8] Tackling Fake News Detection by Continually Improving Social Context Representations using Graph Neural Networks
    Mehta, Nikhil
    Pacheco, Maria Leonor
    Goldwasser, Dan
    PROCEEDINGS OF THE 60TH ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS (ACL 2022), VOL 1: (LONG PAPERS), 2022, : 1363 - 1380
  • [9] Preventing Fake News Propagation in Social Networks Using a Context Trust-Based Security Model
    Voloch, Nadav
    Gudes, Ehud
    Gal-Oz, Nurit
    NETWORK AND SYSTEM SECURITY, NSS 2021, 2021, 13041 : 100 - 115
  • [10] CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies
    Li, Wenjia
    Joshi, Anupam
    Finin, Tim
    DISTRIBUTED AND PARALLEL DATABASES, 2013, 31 (02) : 353 - 376