Enforcing Privacy as Access Control in a Pervasive Context

被引:0
|
作者
Faravelon, Aurelien [1 ]
Chollet, Stephanie [1 ]
Verdier, Christine [1 ]
Front, Agnes [1 ]
机构
[1] Lab Informat Grenoble, F-38041 Grenoble 9, France
关键词
Service-Oriented Computing (SOC); Security; Access Control; Model-Driven Engineering; UML;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Pervasive applications promote a seamless integration of computer artifacts with our daily an business lives. However, they threaten privacy in two ways. Firstly, adaptation to a user's context necessitates a large collection of data. Secondly, context should be addressed when granting users access to information. This paper handles privacy management as an access control problem and argues that privacy should be specified from a global point of view. Investigating privacy specification at a high level of abstraction and its implementation leads to the proposition of a generative approach relying on model-driven engineering. This approach distinguishes a design level for privacy from its execution level. The design level provides a specification language for privacy which emphasizes its contextual features. It is implemented at the execution level as a service composition generated through model transformations. This composition gathers heterogenous entities, such as pieces of software code or devices. The approach is validated on the example of a medical workflow.
引用
收藏
页码:380 / 384
页数:5
相关论文
共 50 条
  • [1] Privacy challenges in Context-sensitive access control for pervasive computing environment
    Ahamed, Sheikh I.
    Talukder, Nilothpal
    Haque, Md. Munirul
    [J]. 2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2007, : 510 - 515
  • [2] Privacy promises, access control, and privacy management - Enforcing privacy throughout an enterprise by extending access control
    Powers, CS
    Ashley, P
    Schunter, M
    [J]. THIRD INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE, PROCEEDINGS, 2002, : 13 - 21
  • [3] Privacy Enhanced Access Control in Pervasive Computing Environments
    Ren, Kui
    Lou, Wenjing
    [J]. 2ND INTERNATIONAL CONFERENCE ON BROADBAND NETWORKS (BROADNETS 2005), 2005, : 384 - +
  • [4] A semantic context-aware access control in pervasive environments
    Ko, Hyuk Jin
    Won, Dong Ho
    Shin, Dong Ryul
    Choo, Hyun Seung
    Kim, Ung Mo
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 2, 2006, 3981 : 165 - 174
  • [5] A Context-aware Access Control Model for Pervasive Environments
    Al-Rwais, Sumayah
    Al-Muhtadi, Jalal
    [J]. IETE TECHNICAL REVIEW, 2010, 27 (05) : 371 - 379
  • [6] A Context-Aware Access Control Model for Pervasive Environments
    Al-Rwais, Sumayah
    Al-Muhtadi, Jalal
    [J]. NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 425 - +
  • [7] Capturing context-awareness in access control for pervasive environments
    Medidi, M
    Nguyen, T
    [J]. PSC '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON PERVASIVE SYSTEMS AND COMPUTING, 2005, : 124 - 130
  • [8] Pervasive computing context access control based on UCONABC model
    Pu, Fang
    Sun, Daoqin
    Cao, Qiying
    Cai, Haibin
    Yang, Fan
    [J]. IIH-MSP: 2006 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2006, : 689 - +
  • [9] Privacy-enhanced, attack-resilient access control in pervasive computing environments with optional context authentication capability
    Ren, Kui
    Lou, Wenjing
    [J]. MOBILE NETWORKS & APPLICATIONS, 2007, 12 (01): : 79 - 92
  • [10] Privacy-enhanced, Attack-resilient Access Control in Pervasive Computing Environments with Optional Context Authentication Capability
    Kui Ren
    Wenjing Lou
    [J]. Mobile Networks and Applications, 2007, 12 : 79 - 92