Privacy-aware Role Based Access Control
Qun Ni, Purdue University, USA, ni@cs.purdue.edu
Alberto Trombetta, Insubria University, Italy, alberto.trombetta@uninsubria.it
Elisa Bertino, Purdue University, USA, bertino@cs.purdue.edu
Jorge Lobo, IBM T.J. Watson, USA, jlobo@us.ibm.com
SACMAT’07, June 20-22, 2007, Sophia Antipolis, France.
Copyright 2007 ACM 978-1-59593-745-2/07/0006 ...$5.00.
1. INTRODUCTION
Privacy is today a key issue in information technology and has received increasing attention from consumers, companies, researchers and legislators. Legislative acts, such as Health Insurance Portability and Accountability Act (HIPAA) [25] for healthcare and Gramm Leach Bliley Act (GLBA) [26] for financial institutions, require enterprises to protect the privacy of their customers. Although enterprises have adopted various strategies to protect customer privacy and to communicate their privacy policies to customers, ... in these approaches there are not systematic mechanisms that describe how consumer personal data is actually handled after it is collected. Privacy protection can only be achieved by enforcing privacy policies within an enterprise’s online and offline data processing systems. Otherwise, enterprises’ actual practices might intentionally or unintentionally violate the privacy policies published at their websites.
Conventional access models, such as Mandatory Access Control (MAC), Discretionary Access Control (DAC), and Role Based Access Control (RBAC) [11, 22], are not designed to enforce privacy policies and barely meet privacy protection requirements[12], particularly, purpose binding (i.e. data collected for one purpose should not used for another purpose without user consent), conditions and obligations. The significance of purposes, conditions, and obligations
originates from OECD Guidelines [19] on the Protection of Privacy and Transborder Flows of Personal Data, current privacy laws in the United States, and public privacy policies of some well know organizations. The OECD guidelines are, to the best of our knowledge, the most well
known set of private information protection principles, on which many other guidelines, data-protection laws, and public privacy policies are based. Purposes are directly applied in the OECD Data Quality Principle, Purpose Specification Principle, and Use Limitation Principle. Purposes are also widely used for specifying privacy rules in legislative acts and actual public policies. HIPPA[25] rules clearly state purposes. The majority of public privacy documents posted at well known sites also specify purposes.
[Page 41]
ACM Digital Library Article (Member Access Only)
Saturday, March 1, 2008
Security: Privacy-aware Role Based Access Control (P-RBAC)
Labels:
access control,
EMR,
medical,
privacy,
role-based,
security
Subscribe to:
Post Comments (Atom)
Blog Archive
-
►
2012
(35)
- ► April 2012 (13)
- ► March 2012 (16)
- ► February 2012 (3)
- ► January 2012 (3)
-
►
2011
(118)
- ► December 2011 (9)
- ► November 2011 (11)
- ► October 2011 (7)
- ► September 2011 (13)
- ► August 2011 (7)
- ► April 2011 (8)
- ► March 2011 (11)
- ► February 2011 (12)
- ► January 2011 (15)
-
►
2010
(183)
- ► December 2010 (16)
- ► November 2010 (15)
- ► October 2010 (15)
- ► September 2010 (25)
- ► August 2010 (19)
- ► April 2010 (21)
- ► March 2010 (7)
- ► February 2010 (6)
- ► January 2010 (6)
-
►
2009
(120)
- ► December 2009 (5)
- ► November 2009 (12)
- ► October 2009 (2)
- ► September 2009 (3)
- ► August 2009 (16)
- ► April 2009 (4)
- ► March 2009 (20)
- ► February 2009 (9)
- ► January 2009 (19)
-
▼
2008
(139)
- ► December 2008 (15)
- ► November 2008 (16)
- ► October 2008 (17)
- ► September 2008 (2)
- ► August 2008 (2)
- ► April 2008 (12)
-
▼
March 2008
(25)
- Web: Mashup Security
- Research: Conversations: Jon Bentley; On Algorithm...
- Web: HTML5 Jumps Off the Drawing Board
- Research: Now Blooming: Digital Models
- Research: The Future of Computing--Carbon Nanotube...
- Research: An Interview With Bjarne Stroustrup
- Software: DSLs Lead Development Paradigm Shift; do...
- Security: NIST Unveils Tool to Foil Attacks via DNS
- Research: Back to Basics: Algorithms
- Security: Researchers Secure the Browser
- Security: Defending Laptops from Zombie Attacks
- Web: Can We Fix the Web?
- Research: How to Make Smarter Software
- Research: Communities and the Networks That Define...
- Security: Researchers Create Next-Generation Softw...
- Security: When browsers attack
- Web: Voting for More Than Just Either-Or
- Software: Web Mashups Made Easy
- Research: Algorithm Finds the Network - For Genes ...
- Web: Study: Digital Universe and Its Impact Bigger...
- Research: Language of a Fly Proves Surprising; res...
- Security: Privacy-aware Role Based Access Control ...
- Security: Role-based access control (RBAC) fundame...
- Security: Role-based access control (RBAC) defined
- Research: From Palmtops to Brain Cells
- ► February 2008 (16)
- ► January 2008 (6)
-
►
2007
(17)
- ► December 2007 (4)
- ► November 2007 (4)
- ► October 2007 (7)
Blog Labels
- research
- CSE
- security
- software
- web
- AI
- development
- hardware
- algorithm
- hackers
- medical
- machine learning
- robotics
- data-mining
- semantic web
- quantum computing
- Cloud computing
- cryptography
- network
- EMR
- search
- NP-complete
- linguistics
- complexity
- data clustering
- optimization
- parallel
- performance
- social network
- HIPAA
- accessibility
- biometrics
- connectionist
- cyber security
- passwords
- voting
- XML
- biological computing
- neural network
- user interface
- DNS
- access control
- firewall
- graph theory
- grid computing
- identity theft
- project management
- role-based
- HTML5
- NLP
- NoSQL
- Python
- cell phone
- database
- java
- open-source
- spam
- GENI
- Javascript
- SQL-Injection
- Wikipedia
- agile
- analog computing
- archives
- biological
- bots
- cellular automata
- computer tips
- crowdsourcing
- e-book
- equilibrium
- game theory
- genetic algorithm
- green tech
- mobile
- nonlinear
- p
- phone
- prediction
- privacy
- self-book publishing
- simulation
- testing
- virtual server
- visualization
- wireless
No comments:
Post a Comment