Privacy query rewriting algorithm instrumented by a privacy-aware access control model

被引:0
|
作者
Said Oulmakhzoune
Nora Cuppens-Boulahia
Frédéric Cuppens
Stéphane Morucci
Mahmoud Barhamgi
Djamal Benslimane
机构
[1] Institut Mines-Telecom/Telecom Bretagne,
[2] SWID,undefined
[3] Lyon 1 University,undefined
关键词
Privacy-aware; PrivOrBAC; RDF; SPARQL; Rewriting algorithm;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we present an approach to instrument a Simple Protocol And RDF Query Language query rewriting algorithm enforcing privacy preferences. The term instrument is used to mean supplying appropriate constraints. We show how to design a real and effective instrumentation process of a rewriting algorithm using an existing privacy-aware access control model like PrivOrBAC. We take into account various dimensions of privacy preferences through the concepts of consent, accuracy, purpose, and recipient. We implement and evaluate our process of privacy enforcement based on a healthcare scenario.
引用
收藏
页码:3 / 19
页数:16
相关论文
共 50 条
  • [1] Privacy query rewriting algorithm instrumented by a privacy-aware access control model
    Oulmakhzoune, Said
    Cuppens-Boulahia, Nora
    Cuppens, Frederic
    Morucci, Stephane
    Barhamgi, Mahmoud
    Benslimane, Djamal
    [J]. ANNALS OF TELECOMMUNICATIONS, 2014, 69 (1-2) : 3 - 19
  • [2] A privacy-aware access control system
    Ardagna, C.
    Cremonini, M.
    di Vimercati, S.
    Samarati, P.
    [J]. JOURNAL OF COMPUTER SECURITY, 2008, 16 (04) : 369 - 397
  • [3] A privacy-aware access control model for distributed network monitoring
    Papagiannakopoulou, Eugenia I.
    Koukovini, Maria N.
    Lioudakis, Georgios V.
    Garcia-Alfaro, Joaquin
    Kaklamani, Dimitra I.
    Venieris, Iakovos S.
    Cuppens, Frederic
    Cuppens-Boulahia, Nora
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2013, 39 (07) : 2263 - 2281
  • [4] Privacy-aware Role Based Access Control
    Ni, Qun
    Trombetta, Alberto
    Bertino, Elisa
    Lobo, Jorge
    [J]. SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2007, : 41 - 50
  • [5] A Semantic Framework for Privacy-Aware Access Control
    Lioudakis, Georgios V.
    Dellas, Nikolaos L.
    Koutsoloukas, Eleftherios A.
    Kapitsaki, Georgia M.
    Kaklamani, Dimitra I.
    Venieris, Iakovos S.
    [J]. 2008 INTERNATIONAL MULTICONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (IMCSIT), VOLS 1 AND 2, 2008, : 757 - 764
  • [6] Access control in a privacy-aware eLearning environment
    Franz, Elke
    Wahrig, Hagen
    Boettcher, Alexander
    Borcea-Pfitzmann, Katrin
    [J]. FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 879 - +
  • [7] A Privacy-Aware Access Model on Anonymized Data
    Huang, Xuezhen
    Liu, Jiqiang
    Han, Zhen
    [J]. TRUSTED SYSTEMS, INTRUST 2014, 2015, 9473 : 201 - 212
  • [8] Privacy-Aware Role-Based Access Control
    Ni, Qun
    Bertino, Elisa
    Lobo, Jorge
    Calo, Seraphin B.
    [J]. IEEE SECURITY & PRIVACY, 2009, 7 (04) : 35 - 43
  • [9] Conditional privacy-aware role based access control
    Ni, Qun
    Lin, Dan
    Bertino, Elisa
    Lobo, Jorge
    [J]. COMPUTER SECURITY - ESORICS 2007, PROCEEDINGS, 2007, 4734 : 72 - +
  • [10] Privacy-Aware Role-Based Access Control
    Ni, Qun
    Bertino, Elisa
    Lobo, Jorge
    Brodie, Carolyn
    Karat, Clare-Marie
    Karat, John
    Trombetta, Alberto
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2010, 13 (03)