Protecting Personal Data: Access Control for Privacy Preserving Perimeter Protection System

被引:2
|
作者
Rath, Annanda Thavymony [1 ]
Colin, Jean-Noel [1 ]
机构
[1] Univ Namur, Fac Comp Sci, Namur, Belgium
关键词
Access control; Purpose enforcement; Perimeter protection system; Privacy-aware policies; Access control system architecture;
D O I
10.1007/978-3-319-20810-7_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we address the issues of personal data protection for privacy preserving perimeter protection system, particularly, the access control for real-time data streamed from surveillance tools and also for data stored in facility's storage. Furthermore, we also provide an access control model proposed specifically for such system and access control system implemented in Java.
引用
收藏
页码:233 / 241
页数:9
相关论文
共 50 条
  • [1] An Access Control Scheme for Protecting Personal Data
    Villegas, Wilfred
    Ali, Bader
    Maheswaran, Muthucumaru
    [J]. SIXTH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, PROCEEDINGS, 2008, : 24 - 35
  • [2] Privacy Preserving, Protection of Personal Data, and Big Data: a Review of the Colombia Case
    Silva, Jesus
    Solano, Darwin
    Fernandez, Claudia
    Romero, Ligia
    Vargas Villa, Jesus
    [J]. 10TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2019) / THE 2ND INTERNATIONAL CONFERENCE ON EMERGING DATA AND INDUSTRY 4.0 (EDI40 2019) / AFFILIATED WORKSHOPS, 2019, 151 : 1213 - 1218
  • [3] Privacy-preserving emergency access control for personal health records
    Thummavet, Phuwanai
    Vasupongayya, Sangsuree
    [J]. MAEJO INTERNATIONAL JOURNAL OF SCIENCE AND TECHNOLOGY, 2015, 9 (01) : 108 - 120
  • [4] Cloud Computing: Preserving Data Privacy and Managing Access Control
    Giweli, Nabil
    Shahrestani, Seyed
    Cheung, Hon
    [J]. INNOVATION VISION 2020: SUSTAINABLE GROWTH, ENTREPRENEURSHIP, AND ECONOMIC DEVELOPMENT, VOLS 1-4, 2012, : 1742 - 1748
  • [5] Location Based Privacy Preserving Access Control for Relational Data
    Lakadkutta, Ahmed H. I.
    Mante, R. V.
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2016, : 2083 - 2087
  • [6] Privacy-Preserving Distributed Data Access Control for CloudIoT
    Nasiraee, Hassan
    Ashouri-Talouki, Maede
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2476 - 2487
  • [7] Privacy-Preserving Data Processing with Flexible Access Control
    Ding, Wenxiu
    Yan, Zheng
    Deng, Robert H.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (02) : 363 - 376
  • [8] On protecting & preserving personal privacy in interoperable global healthcare venues
    Mathews, Robert
    [J]. HEALTH AND TECHNOLOGY, 2016, 6 (01) : 53 - 73
  • [9] Privacy-Preserving Queries over Outsourced Data with Access Pattern Protection
    Li, Shun-Pun
    Wong, Man-Hon
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOP (ICDMW), 2014, : 581 - 588
  • [10] PERiMETER - pseudonymization and personal metadata encryption for privacy-preserving searchable documents
    Heurix, Johannes
    Karlinger, Michael
    Neubauer, Thomas
    [J]. HEALTH SYSTEMS, 2012, 1 (01) : 46 - 57