Privacy Policies Model in Access Control

被引:0
|
作者
Werner, Jorge [1 ]
Westphall, Carla Merkle [1 ]
Vargas, Andre Azevedo [1 ]
Westphall, Carlos Becker [1 ]
机构
[1] Univ Fed Santa Catarina, Postgrad Program Comp Sci, POB 476, BR-88040970 Florianopolis, SC, Brazil
关键词
SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing advancement of services on the Internet, due to the strengthening of cloud computing, the exchange of data between providers and users is intense. Management of access control and applications need data to identify users and/or perform services in an automated and more practical way. Applications have to protect access to data collected. However, users often provide data in cloud environments and do not know what was collected, how or by whom data will be used. Privacy of personal data has been a challenge for information security. This paper presents the development and use of a privacy policy strategy, i. e., it was proposed a privacy policy model and format to be integrated with the authorization task. An access control language and the preferences defined by the owner of information were used to implement the proposals. The results showed that the strategy is feasible, guaranteeing to the users the right over their data.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] HECC based Patient Privacy Preserving Access Control Model
    Prasanalakshmi, B.
    Pugalendhi, Ganesh Kumar
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (03): : 50 - 53
  • [22] Dynamic permission access control model based on privacy protection
    Zhang, Qikun
    Zhu, Liang
    Zhao, Kunyuan
    Wu, Yimeng
    Jin, Baohua
    Li, Jianyong
    Meng, Yinghui
    Hu, Sikang
    TELECOMMUNICATION SYSTEMS, 2022, 81 (02) : 191 - 205
  • [23] Privacy Preserving Delegated Access Control in the Storage as a Service Model
    Nabeel, Mohamed
    Bertino, Elisa
    2012 IEEE 13TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), 2012, : 645 - 652
  • [24] Privacy query rewriting algorithm instrumented by a privacy-aware access control model
    Oulmakhzoune, Said
    Cuppens-Boulahia, Nora
    Cuppens, Frederic
    Morucci, Stephane
    Barhamgi, Mahmoud
    Benslimane, Djamal
    ANNALS OF TELECOMMUNICATIONS, 2014, 69 (1-2) : 3 - 19
  • [25] A privacy protection model in ID management using access control
    Choi, HC
    Yi, YH
    Seo, JH
    Noh, BN
    Lee, HH
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 2, 2005, 3481 : 82 - 91
  • [26] Using Petri nets to verify access policies in mandatory access control model
    Jiang, YX
    Lin, C
    Chen, Z
    Yin, H
    PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI-2004), 2004, : 271 - 276
  • [27] Automated Analysis of Access Control Policies Based on Model Checking
    Truong A.
    SN Computer Science, 2020, 1 (6)
  • [28] Model Checking Agent Knowledge in Dynamic Access Control Policies
    Koleini, Masoud
    Ritter, Eike
    Ryan, Mark
    TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, TACAS 2013, 2013, 7795 : 448 - 462
  • [29] A model for checking consistency in access control policies for network management
    Cridlig, Vincent
    State, Radu
    Festor, Olivier
    2007 10TH IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2009), VOLS 1 AND 2, 2007, : 11 - +
  • [30] A Meta-level Access Control Model for Adapting Diverse Access Control Policies on OS Environment
    Park, Jun-Hyung
    Kim, Jung-Sun
    Seo, Jae-Hyun
    Kim, Minsoo
    SECTECH: 2008 INTERNATIONAL CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2008, : 169 - +