Privacy Policies Model in Access Control

被引:0
|
作者
Werner, Jorge [1 ]
Westphall, Carla Merkle [1 ]
Vargas, Andre Azevedo [1 ]
Westphall, Carlos Becker [1 ]
机构
[1] Univ Fed Santa Catarina, Postgrad Program Comp Sci, POB 476, BR-88040970 Florianopolis, SC, Brazil
关键词
SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing advancement of services on the Internet, due to the strengthening of cloud computing, the exchange of data between providers and users is intense. Management of access control and applications need data to identify users and/or perform services in an automated and more practical way. Applications have to protect access to data collected. However, users often provide data in cloud environments and do not know what was collected, how or by whom data will be used. Privacy of personal data has been a challenge for information security. This paper presents the development and use of a privacy policy strategy, i. e., it was proposed a privacy policy model and format to be integrated with the authorization task. An access control language and the preferences defined by the owner of information were used to implement the proposals. The results showed that the strategy is feasible, guaranteeing to the users the right over their data.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] An Obligation Model Bridging Access Control Policies and Privacy Policies
    Ni, Qun
    Bertino, Elisa
    Lobo, Jorge
    SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2008, : 133 - 142
  • [2] Governance policies for privacy access control and their interactions
    Hassan, W
    Logrippo, L
    FEATURE INTERACTIONS IN TELECOMMUNICATIONS AND SOFTWARE SYSTEMS VIII, 2005, : 114 - 130
  • [3] Scalable Automated Analysis of Access Control and Privacy Policies
    Anh Truong
    Ranise, Silvio
    Thanh Tung Nguyen
    TRANSACTIONS ON LARGE-SCALE DATA- AND KNOWLEDGECENTERED SYSTEMS XXXVI: SPECIAL ISSUE ON DATA AND SECURITY ENGINEERING, 2018, 10720 : 142 - 171
  • [4] A Privacy-Enhanced Access Control Model
    Xu, Fei
    He, Jingsha
    Wu, Xu
    Xu, Jing
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 703 - +
  • [5] Delegation of access rights in a privacy preserving access control model
    Moniruzzaman, Md
    Barker, Ken
    2011 NINTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2011, : 124 - 133
  • [6] Visualizing Privacy Implications of Access Control Policies in Social Network Systems
    Anwar, Mohd
    Fong, Philip W. L.
    Yang, Xue-Dong
    Hamilton, Howard
    DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, 2010, 5939 : 106 - +
  • [7] Algebraic Model for Handling Access Control Policies
    Sabri, Khair Eddin
    Hiary, Hazem
    7TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2016) / THE 6TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2016) / AFFILIATED WORKSHOPS, 2016, 83 : 653 - 657
  • [8] Model-checking access control policies
    Guelev, DP
    Ryan, M
    Schobbens, PY
    INFORMATION SECURITY, PROCEEDINGS, 2004, 3225 : 219 - 230
  • [9] Access control based privacy preserving secure data sharing with hidden access policies in cloud
    Sabitha, S.
    Rajasree, M. S.
    JOURNAL OF SYSTEMS ARCHITECTURE, 2017, 75 : 50 - 58
  • [10] Consumer Control and Privacy Policies
    Ali, Nageeb
    Lewis, Greg
    Vasserman, Shoshana
    AEA PAPERS AND PROCEEDINGS, 2023, 113 : 209 - 209