Secure knowledge management: Confidentiality, trust, and privacy

被引:69
|
作者
Bertino, Elisa [1 ]
Khan, Latifur R.
Sandhu, Ravi
Thuraisingham, Bhavani
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[2] Univ Texas, Richardson, TX 75083 USA
[3] George Mason Univ, Dept Ind & Syst Engn, Fairfax, VA 22030 USA
关键词
data mining; privacy; role-based access control (RBAC); secure knowledge management; security policy; semantic web; trust negotiation (TN); usage control (UCON);
D O I
10.1109/TSMCA.2006.871796
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Knowledge management enhances the value of a corporation by identifying the assets and expertise as well as efficiently managing the resources. Security for knowledge management is critical as organizations have to protect their intellectual assets. Therefore, only authorized individuals must be permitted to execute various operations and functions in an organization. In this paper, secure knowledge management will be discussed, focusing on confidentiality, trust, and privacy. In particular, certain access-control techniques will be investigated, and trust management as well as privacy control for knowledge management will be explored.
引用
收藏
页码:429 / 438
页数:10
相关论文
共 50 条
  • [21] PRIVACY AND CONFIDENTIALITY - REPLY
    BAUMAN, WA
    [J]. NEW YORK STATE JOURNAL OF MEDICINE, 1980, 80 (06) : 1027 - 1027
  • [22] Data privacy and confidentiality
    Mann, RD
    [J]. PHARMACOEPIDEMIOLOGY AND DRUG SAFETY, 1999, 8 (04) : 245 - 245
  • [23] PRIVACY AND CONFIDENTIALITY IN PSYCHOTHERAPY
    EVERSTINE, L
    EVERSTINE, DS
    HEYMANN, GM
    TRUE, RH
    FREY, DH
    JOHNSON, HG
    SEIDEN, RH
    [J]. AMERICAN PSYCHOLOGIST, 1980, 35 (09) : 828 - 840
  • [24] PRIVACY AND CONFIDENTIALITY RESOURCES
    Zayatz, Laura
    [J]. JOURNAL OF EMPIRICAL RESEARCH ON HUMAN RESEARCH ETHICS, 2009, 4 (03) : 33 - 34
  • [25] Issues with Trust Management and Trust Based Secure Routing in MANET
    Ullah, Zakir
    Islam, Muhammad Hasan
    Khan, Adnan Ahmed
    [J]. 2016 13TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2016, : 402 - 408
  • [26] Key management approaches to offer data confidentiality for secure multicast
    Chan, KC
    Chan, SHG
    [J]. IEEE NETWORK, 2003, 17 (05): : 30 - 39
  • [27] PROTECTION OF PRIVACY AND CONFIDENTIALITY
    CURRAN, WJ
    LASKA, EM
    KAPLAN, H
    BANK, R
    [J]. SCIENCE, 1973, 182 (4114) : 797 - 802
  • [28] A taxonomy on privacy and confidentiality
    Nunes, Jose Benardi S.
    Brito, Andrey
    [J]. PROCEEDINGS OF 2022 11TH LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING, LADC 2022, 2022, : 1 - 10
  • [29] FETAL PRIVACY AND CONFIDENTIALITY
    BOTKIN, JR
    [J]. HASTINGS CENTER REPORT, 1995, 25 (05) : 32 - 39
  • [30] MATTERS OF PRIVACY AND CONFIDENTIALITY
    CHASE, HC
    [J]. AMERICAN JOURNAL OF PUBLIC HEALTH, 1977, 67 (11) : 1108 - 1109