Enforcing Privacy as Access Control in a Pervasive Context

被引:0
|
作者
Faravelon, Aurelien [1 ]
Chollet, Stephanie [1 ]
Verdier, Christine [1 ]
Front, Agnes [1 ]
机构
[1] Lab Informat Grenoble, F-38041 Grenoble 9, France
关键词
Service-Oriented Computing (SOC); Security; Access Control; Model-Driven Engineering; UML;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Pervasive applications promote a seamless integration of computer artifacts with our daily an business lives. However, they threaten privacy in two ways. Firstly, adaptation to a user's context necessitates a large collection of data. Secondly, context should be addressed when granting users access to information. This paper handles privacy management as an access control problem and argues that privacy should be specified from a global point of view. Investigating privacy specification at a high level of abstraction and its implementation leads to the proposition of a generative approach relying on model-driven engineering. This approach distinguishes a design level for privacy from its execution level. The design level provides a specification language for privacy which emphasizes its contextual features. It is implemented at the execution level as a service composition generated through model transformations. This composition gathers heterogenous entities, such as pieces of software code or devices. The approach is validated on the example of a medical workflow.
引用
收藏
页码:380 / 384
页数:5
相关论文
共 50 条
  • [41] A context, rule and role-based access control model in enterprise pervasive computing environment
    Huang, Xianzhi
    Wang, Haiyang
    Chen, Zhenxiang
    Lin, Jinjiao
    [J]. 2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 497 - +
  • [42] The CONNECT platform:: An architecture for context-aware privacy in pervasive environments
    Bagues, Susana Alcalde
    Mitic, Jelena
    Emberger, Elisabeth-Anna
    [J]. 2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 117 - 126
  • [43] Enforcing Context-Awareness and Privacy-by-Design in the Specification of Information Systems
    Shishkov, Boris
    Janssen, Marijn
    [J]. BUSINESS MODELING AND SOFTWARE DESIGN, BMSD 2017, 2018, 309 : 87 - 111
  • [44] Access Control Encryption: Enforcing Information Flow with Cryptography
    Damgard, Ivan
    Haagh, Helene
    Orlandi, Claudio
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT II, 2016, 9986 : 547 - 576
  • [45] Enforcing legal ownership rights by an access control system
    Born, Eike
    [J]. Computers and Security, 1996, 15 (03): : 212 - 220
  • [46] Self-Enforcing Access Control for Encrypted RDF
    Fernandez, Javier D.
    Kirrane, Sabrina
    Polleres, Axel
    Steyskal, Simon
    [J]. SEMANTIC WEB ( ESWC 2017), PT I, 2017, 10249 : 607 - 622
  • [47] Modeling and Enforcing Access Control Policies for Smart Contracts
    Toberg, Jan-Philipp
    Schiffl, Jonas
    Reiche, Frederik
    Beckert, Bernhard
    Heinrich, Robert
    Reussner, Ralf
    [J]. 2022 FOURTH IEEE INTERNATIONAL CONFERENCE ON DECENTRALIZED APPLICATIONS AND INFRASTRUCTURES (DAPPS 2022), 2022, : 38 - 47
  • [48] ACStream: Enforcing Access Control Over Data Streams
    Cao, Jianneng
    Carminati, Barbara
    Ferrari, Elena
    Tan, Kian-Lee
    [J]. ICDE: 2009 IEEE 25TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2009, : 1495 - +
  • [49] Enforcing legal ownership rights by an access control system
    Born, E
    [J]. COMPUTERS & SECURITY, 1996, 15 (03) : 212 - 226
  • [50] A Web Service Architecture for Enforcing Access Control Policies
    Ardagna, Claudio Agostino
    Damiani, Ernesto
    di Vimercati, Sabrina De Capitani
    Samarati, Pierangela
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2006, 142 : 47 - 62