Serveur d'exploration sur l'OCR

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Conditional Privacy-Aware Role Based Access Control

Identifieur interne : 002717 ( Istex/Corpus ); précédent : 002716; suivant : 002718

Conditional Privacy-Aware Role Based Access Control

Auteurs : Qun Ni ; Dan Lin ; Elisa Bertino ; Jorge Lobo

Source :

RBID : ISTEX:34F8C52F07805E9FD4D7020AF548BDE3E86D576F

Abstract

Abstract: Privacy is considered critical for all organizations needing to manage individual related information. As such, there is an increasing need for access control models which can adequately support the specification and enforcement of privacy policies. In this paper, we propose a model, referred to as Conditional Privacy-aware Role Based Access Control (P-RBAC), which supports expressive condition languages and flexible relations among permission assignments for more complex privacy policies. Efficient algorithms for detecting conflicts, redundancies, and indeterminism for a set of permission assignments are presented. In the paper we also extend Conditional P-RBAC to Universal P-RBAC by taking into account hierarchical relations among roles, data and purposes. In comparison with other approaches, such as P3P, EPAL, and XACML, our work has achieved both expressiveness and efficiency.

Url:
DOI: 10.1007/978-3-540-74835-9_6

Links to Exploration step

ISTEX:34F8C52F07805E9FD4D7020AF548BDE3E86D576F

Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Conditional Privacy-Aware Role Based Access Control</title>
<author>
<name sortKey="Ni, Qun" sort="Ni, Qun" uniqKey="Ni Q" first="Qun" last="Ni">Qun Ni</name>
<affiliation>
<mods:affiliation>Department of Computer Science, Purdue University, W. Lafayette, IN 47907, USA</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: ni@cs.purdue.edu</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Lin, Dan" sort="Lin, Dan" uniqKey="Lin D" first="Dan" last="Lin">Dan Lin</name>
<affiliation>
<mods:affiliation>Department of Computer Science, Purdue University, W. Lafayette, IN 47907, USA</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: lindan@cs.purdue.edu</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Bertino, Elisa" sort="Bertino, Elisa" uniqKey="Bertino E" first="Elisa" last="Bertino">Elisa Bertino</name>
<affiliation>
<mods:affiliation>Department of Computer Science, Purdue University, W. Lafayette, IN 47907, USA</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: bertino@cs.purdue.edu</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Lobo, Jorge" sort="Lobo, Jorge" uniqKey="Lobo J" first="Jorge" last="Lobo">Jorge Lobo</name>
<affiliation>
<mods:affiliation>IBM Watson Research Center, Hawthorne, NY 10598, USA</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: jlobo@us.ibm.com</mods:affiliation>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:34F8C52F07805E9FD4D7020AF548BDE3E86D576F</idno>
<date when="2007" year="2007">2007</date>
<idno type="doi">10.1007/978-3-540-74835-9_6</idno>
<idno type="url">https://api.istex.fr/document/34F8C52F07805E9FD4D7020AF548BDE3E86D576F/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">002717</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Conditional Privacy-Aware Role Based Access Control</title>
<author>
<name sortKey="Ni, Qun" sort="Ni, Qun" uniqKey="Ni Q" first="Qun" last="Ni">Qun Ni</name>
<affiliation>
<mods:affiliation>Department of Computer Science, Purdue University, W. Lafayette, IN 47907, USA</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: ni@cs.purdue.edu</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Lin, Dan" sort="Lin, Dan" uniqKey="Lin D" first="Dan" last="Lin">Dan Lin</name>
<affiliation>
<mods:affiliation>Department of Computer Science, Purdue University, W. Lafayette, IN 47907, USA</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: lindan@cs.purdue.edu</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Bertino, Elisa" sort="Bertino, Elisa" uniqKey="Bertino E" first="Elisa" last="Bertino">Elisa Bertino</name>
<affiliation>
<mods:affiliation>Department of Computer Science, Purdue University, W. Lafayette, IN 47907, USA</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: bertino@cs.purdue.edu</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Lobo, Jorge" sort="Lobo, Jorge" uniqKey="Lobo J" first="Jorge" last="Lobo">Jorge Lobo</name>
<affiliation>
<mods:affiliation>IBM Watson Research Center, Hawthorne, NY 10598, USA</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: jlobo@us.ibm.com</mods:affiliation>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<imprint>
<date>2007</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
<idno type="istex">34F8C52F07805E9FD4D7020AF548BDE3E86D576F</idno>
<idno type="DOI">10.1007/978-3-540-74835-9_6</idno>
<idno type="ChapterID">6</idno>
<idno type="ChapterID">Chap6</idno>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
<langUsage>
<language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: Privacy is considered critical for all organizations needing to manage individual related information. As such, there is an increasing need for access control models which can adequately support the specification and enforcement of privacy policies. In this paper, we propose a model, referred to as Conditional Privacy-aware Role Based Access Control (P-RBAC), which supports expressive condition languages and flexible relations among permission assignments for more complex privacy policies. Efficient algorithms for detecting conflicts, redundancies, and indeterminism for a set of permission assignments are presented. In the paper we also extend Conditional P-RBAC to Universal P-RBAC by taking into account hierarchical relations among roles, data and purposes. In comparison with other approaches, such as P3P, EPAL, and XACML, our work has achieved both expressiveness and efficiency.</div>
</front>
</TEI>
<istex>
<corpusName>springer</corpusName>
<author>
<json:item>
<name>Qun Ni</name>
<affiliations>
<json:string>Department of Computer Science, Purdue University, W. Lafayette, IN 47907, USA</json:string>
<json:string>E-mail: ni@cs.purdue.edu</json:string>
</affiliations>
</json:item>
<json:item>
<name>Dan Lin</name>
<affiliations>
<json:string>Department of Computer Science, Purdue University, W. Lafayette, IN 47907, USA</json:string>
<json:string>E-mail: lindan@cs.purdue.edu</json:string>
</affiliations>
</json:item>
<json:item>
<name>Elisa Bertino</name>
<affiliations>
<json:string>Department of Computer Science, Purdue University, W. Lafayette, IN 47907, USA</json:string>
<json:string>E-mail: bertino@cs.purdue.edu</json:string>
</affiliations>
</json:item>
<json:item>
<name>Jorge Lobo</name>
<affiliations>
<json:string>IBM Watson Research Center, Hawthorne, NY 10598, USA</json:string>
<json:string>E-mail: jlobo@us.ibm.com</json:string>
</affiliations>
</json:item>
</author>
<language>
<json:string>eng</json:string>
</language>
<abstract>Abstract: Privacy is considered critical for all organizations needing to manage individual related information. As such, there is an increasing need for access control models which can adequately support the specification and enforcement of privacy policies. In this paper, we propose a model, referred to as Conditional Privacy-aware Role Based Access Control (P-RBAC), which supports expressive condition languages and flexible relations among permission assignments for more complex privacy policies. Efficient algorithms for detecting conflicts, redundancies, and indeterminism for a set of permission assignments are presented. In the paper we also extend Conditional P-RBAC to Universal P-RBAC by taking into account hierarchical relations among roles, data and purposes. In comparison with other approaches, such as P3P, EPAL, and XACML, our work has achieved both expressiveness and efficiency.</abstract>
<qualityIndicators>
<score>6.512</score>
<pdfVersion>1.3</pdfVersion>
<pdfPageSize>430 x 660 pts</pdfPageSize>
<refBibsNative>false</refBibsNative>
<keywordCount>0</keywordCount>
<abstractCharCount>903</abstractCharCount>
<pdfWordCount>8298</pdfWordCount>
<pdfCharCount>44288</pdfCharCount>
<pdfPageCount>18</pdfPageCount>
<abstractWordCount>126</abstractWordCount>
</qualityIndicators>
<title>Conditional Privacy-Aware Role Based Access Control</title>
<genre.original>
<json:string>OriginalPaper</json:string>
</genre.original>
<chapterId>
<json:string>6</json:string>
<json:string>Chap6</json:string>
</chapterId>
<genre>
<json:string>conference [eBooks]</json:string>
</genre>
<serie>
<editor>
<json:item>
<name>David Hutchison</name>
</json:item>
<json:item>
<name>Takeo Kanade</name>
</json:item>
<json:item>
<name>Josef Kittler</name>
</json:item>
<json:item>
<name>Jon M. Kleinberg</name>
</json:item>
<json:item>
<name>Friedemann Mattern</name>
</json:item>
<json:item>
<name>John C. Mitchell</name>
</json:item>
<json:item>
<name>Moni Naor</name>
</json:item>
<json:item>
<name>Oscar Nierstrasz</name>
</json:item>
<json:item>
<name>C. Pandu Rangan</name>
</json:item>
<json:item>
<name>Bernhard Steffen</name>
</json:item>
<json:item>
<name>Madhu Sudan</name>
</json:item>
<json:item>
<name>Demetri Terzopoulos</name>
</json:item>
<json:item>
<name>Doug Tygar</name>
</json:item>
<json:item>
<name>Moshe Y. Vardi</name>
</json:item>
<json:item>
<name>Gerhard Weikum</name>
</json:item>
</editor>
<issn>
<json:string>0302-9743</json:string>
</issn>
<language>
<json:string>unknown</json:string>
</language>
<eissn>
<json:string>1611-3349</json:string>
</eissn>
<title>Lecture Notes in Computer Science</title>
<copyrightDate>2007</copyrightDate>
</serie>
<host>
<editor>
<json:item>
<name>Joachim Biskup</name>
</json:item>
<json:item>
<name>Javier López</name>
</json:item>
</editor>
<subject>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Data Encryption</value>
</json:item>
<json:item>
<value>Operating Systems</value>
</json:item>
<json:item>
<value>Computer Communication Networks</value>
</json:item>
<json:item>
<value>Database Management</value>
</json:item>
<json:item>
<value>Management of Computing and Information Systems</value>
</json:item>
<json:item>
<value>Computers and Society</value>
</json:item>
</subject>
<isbn>
<json:string>978-3-540-74834-2</json:string>
</isbn>
<language>
<json:string>unknown</json:string>
</language>
<eissn>
<json:string>1611-3349</json:string>
</eissn>
<title>Computer Security – ESORICS 2007</title>
<genre.original>
<json:string>Proceedings</json:string>
</genre.original>
<bookId>
<json:string>978-3-540-74835-9</json:string>
</bookId>
<volume>4734</volume>
<pages>
<last>89</last>
<first>72</first>
</pages>
<issn>
<json:string>0302-9743</json:string>
</issn>
<genre>
<json:string>Book Series</json:string>
</genre>
<eisbn>
<json:string>978-3-540-74835-9</json:string>
</eisbn>
<copyrightDate>2007</copyrightDate>
<doi>
<json:string>10.1007/978-3-540-74835-9</json:string>
</doi>
</host>
<publicationDate>2007</publicationDate>
<copyrightDate>2007</copyrightDate>
<doi>
<json:string>10.1007/978-3-540-74835-9_6</json:string>
</doi>
<id>34F8C52F07805E9FD4D7020AF548BDE3E86D576F</id>
<fulltext>
<json:item>
<original>true</original>
<mimetype>application/pdf</mimetype>
<extension>pdf</extension>
<uri>https://api.istex.fr/document/34F8C52F07805E9FD4D7020AF548BDE3E86D576F/fulltext/pdf</uri>
</json:item>
<json:item>
<original>false</original>
<mimetype>application/zip</mimetype>
<extension>zip</extension>
<uri>https://api.istex.fr/document/34F8C52F07805E9FD4D7020AF548BDE3E86D576F/fulltext/zip</uri>
</json:item>
<istex:fulltextTEI uri="https://api.istex.fr/document/34F8C52F07805E9FD4D7020AF548BDE3E86D576F/fulltext/tei">
<teiHeader>
<fileDesc>
<titleStmt>
<title level="a" type="main" xml:lang="en">Conditional Privacy-Aware Role Based Access Control</title>
<respStmt xml:id="ISTEX-API" resp="Références bibliographiques récupérées via GROBID" name="ISTEX-API (INIST-CNRS)"></respStmt>
</titleStmt>
<publicationStmt>
<authority>ISTEX</authority>
<publisher>Springer Berlin Heidelberg</publisher>
<pubPlace>Berlin, Heidelberg</pubPlace>
<availability>
<p>SPRINGER</p>
</availability>
<date>2007</date>
</publicationStmt>
<sourceDesc>
<biblStruct type="inbook">
<analytic>
<title level="a" type="main" xml:lang="en">Conditional Privacy-Aware Role Based Access Control</title>
<author>
<persName>
<forename type="first">Qun</forename>
<surname>Ni</surname>
</persName>
<email>ni@cs.purdue.edu</email>
<affiliation>Department of Computer Science, Purdue University, W. Lafayette, IN 47907, USA</affiliation>
</author>
<author>
<persName>
<forename type="first">Dan</forename>
<surname>Lin</surname>
</persName>
<email>lindan@cs.purdue.edu</email>
<affiliation>Department of Computer Science, Purdue University, W. Lafayette, IN 47907, USA</affiliation>
</author>
<author>
<persName>
<forename type="first">Elisa</forename>
<surname>Bertino</surname>
</persName>
<email>bertino@cs.purdue.edu</email>
<affiliation>Department of Computer Science, Purdue University, W. Lafayette, IN 47907, USA</affiliation>
</author>
<author>
<persName>
<forename type="first">Jorge</forename>
<surname>Lobo</surname>
</persName>
<email>jlobo@us.ibm.com</email>
<affiliation>IBM Watson Research Center, Hawthorne, NY 10598, USA</affiliation>
</author>
</analytic>
<monogr>
<title level="m">Computer Security – ESORICS 2007</title>
<title level="m" type="sub">12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 — 26, 2007. Proceedings</title>
<idno type="pISBN">978-3-540-74834-2</idno>
<idno type="eISBN">978-3-540-74835-9</idno>
<idno type="pISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="DOI">10.1007/978-3-540-74835-9</idno>
<idno type="BookID">978-3-540-74835-9</idno>
<idno type="BookTitleID">152394</idno>
<idno type="BookSequenceNumber">4734</idno>
<idno type="BookVolumeNumber">4734</idno>
<idno type="BookChapterCount">40</idno>
<editor>
<persName>
<forename type="first">Joachim</forename>
<surname>Biskup</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Javier</forename>
<surname>López</surname>
</persName>
</editor>
<imprint>
<publisher>Springer Berlin Heidelberg</publisher>
<pubPlace>Berlin, Heidelberg</pubPlace>
<date type="published" when="2007"></date>
<biblScope unit="volume">4734</biblScope>
<biblScope unit="page" from="72">72</biblScope>
<biblScope unit="page" to="89">89</biblScope>
</imprint>
</monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<editor>
<persName>
<forename type="first">David</forename>
<surname>Hutchison</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Takeo</forename>
<surname>Kanade</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Josef</forename>
<surname>Kittler</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Jon</forename>
<forename type="first">M.</forename>
<surname>Kleinberg</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Friedemann</forename>
<surname>Mattern</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">John</forename>
<forename type="first">C.</forename>
<surname>Mitchell</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Moni</forename>
<surname>Naor</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Oscar</forename>
<surname>Nierstrasz</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">C.</forename>
<surname>Pandu Rangan</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Bernhard</forename>
<surname>Steffen</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Madhu</forename>
<surname>Sudan</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Demetri</forename>
<surname>Terzopoulos</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Doug</forename>
<surname>Tygar</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Moshe</forename>
<forename type="first">Y.</forename>
<surname>Vardi</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Gerhard</forename>
<surname>Weikum</surname>
</persName>
</editor>
<biblScope>
<date>2007</date>
</biblScope>
<idno type="pISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="seriesId">558</idno>
</series>
<idno type="istex">34F8C52F07805E9FD4D7020AF548BDE3E86D576F</idno>
<idno type="DOI">10.1007/978-3-540-74835-9_6</idno>
<idno type="ChapterID">6</idno>
<idno type="ChapterID">Chap6</idno>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<creation>
<date>2007</date>
</creation>
<langUsage>
<language ident="en">en</language>
</langUsage>
<abstract xml:lang="en">
<p>Abstract: Privacy is considered critical for all organizations needing to manage individual related information. As such, there is an increasing need for access control models which can adequately support the specification and enforcement of privacy policies. In this paper, we propose a model, referred to as Conditional Privacy-aware Role Based Access Control (P-RBAC), which supports expressive condition languages and flexible relations among permission assignments for more complex privacy policies. Efficient algorithms for detecting conflicts, redundancies, and indeterminism for a set of permission assignments are presented. In the paper we also extend Conditional P-RBAC to Universal P-RBAC by taking into account hierarchical relations among roles, data and purposes. In comparison with other approaches, such as P3P, EPAL, and XACML, our work has achieved both expressiveness and efficiency.</p>
</abstract>
<textClass>
<keywords scheme="Book Subject Collection">
<list>
<label>SUCO11645</label>
<item>
<term>Computer Science</term>
</item>
</list>
</keywords>
</textClass>
<textClass>
<keywords scheme="Book Subject Group">
<list>
<label>I</label>
<label>I15033</label>
<label>I14045</label>
<label>I13022</label>
<label>I18024</label>
<label>I24067</label>
<label>I24040</label>
<item>
<term>Computer Science</term>
</item>
<item>
<term>Data Encryption</term>
</item>
<item>
<term>Operating Systems</term>
</item>
<item>
<term>Computer Communication Networks</term>
</item>
<item>
<term>Database Management</term>
</item>
<item>
<term>Management of Computing and Information Systems</term>
</item>
<item>
<term>Computers and Society</term>
</item>
</list>
</keywords>
</textClass>
</profileDesc>
<revisionDesc>
<change when="2007">Published</change>
<change xml:id="refBibs-istex" who="#ISTEX-API" when="2016-3-20">References added</change>
</revisionDesc>
</teiHeader>
</istex:fulltextTEI>
<json:item>
<original>false</original>
<mimetype>text/plain</mimetype>
<extension>txt</extension>
<uri>https://api.istex.fr/document/34F8C52F07805E9FD4D7020AF548BDE3E86D576F/fulltext/txt</uri>
</json:item>
</fulltext>
<metadata>
<istex:metadataXml wicri:clean="Springer, Publisher found" wicri:toSee="no header">
<istex:xmlDeclaration>version="1.0" encoding="UTF-8"</istex:xmlDeclaration>
<istex:docType PUBLIC="-//Springer-Verlag//DTD A++ V2.4//EN" URI="http://devel.springer.de/A++/V2.4/DTD/A++V2.4.dtd" name="istex:docType"></istex:docType>
<istex:document>
<Publisher>
<PublisherInfo>
<PublisherName>Springer Berlin Heidelberg</PublisherName>
<PublisherLocation>Berlin, Heidelberg</PublisherLocation>
</PublisherInfo>
<Series>
<SeriesInfo SeriesType="Series" TocLevels="0">
<SeriesID>558</SeriesID>
<SeriesPrintISSN>0302-9743</SeriesPrintISSN>
<SeriesElectronicISSN>1611-3349</SeriesElectronicISSN>
<SeriesTitle Language="En">Lecture Notes in Computer Science</SeriesTitle>
</SeriesInfo>
<SeriesHeader>
<EditorGroup>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>David</GivenName>
<FamilyName>Hutchison</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Takeo</GivenName>
<FamilyName>Kanade</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Josef</GivenName>
<FamilyName>Kittler</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Jon</GivenName>
<GivenName>M.</GivenName>
<FamilyName>Kleinberg</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Friedemann</GivenName>
<FamilyName>Mattern</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>John</GivenName>
<GivenName>C.</GivenName>
<FamilyName>Mitchell</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Moni</GivenName>
<FamilyName>Naor</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Oscar</GivenName>
<FamilyName>Nierstrasz</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>C.</GivenName>
<FamilyName>Pandu Rangan</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Bernhard</GivenName>
<FamilyName>Steffen</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Madhu</GivenName>
<FamilyName>Sudan</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Demetri</GivenName>
<FamilyName>Terzopoulos</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Doug</GivenName>
<FamilyName>Tygar</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Moshe</GivenName>
<GivenName>Y.</GivenName>
<FamilyName>Vardi</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Gerhard</GivenName>
<FamilyName>Weikum</FamilyName>
</EditorName>
</Editor>
</EditorGroup>
</SeriesHeader>
<Book Language="En">
<BookInfo BookProductType="Proceedings" ContainsESM="No" Language="En" MediaType="eBook" NumberingStyle="Unnumbered" OutputMedium="All" TocLevels="0">
<BookID>978-3-540-74835-9</BookID>
<BookTitle>Computer Security – ESORICS 2007</BookTitle>
<BookSubTitle>12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 — 26, 2007. Proceedings</BookSubTitle>
<BookVolumeNumber>4734</BookVolumeNumber>
<BookSequenceNumber>4734</BookSequenceNumber>
<BookDOI>10.1007/978-3-540-74835-9</BookDOI>
<BookTitleID>152394</BookTitleID>
<BookPrintISBN>978-3-540-74834-2</BookPrintISBN>
<BookElectronicISBN>978-3-540-74835-9</BookElectronicISBN>
<BookChapterCount>40</BookChapterCount>
<BookCopyright>
<CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2007</CopyrightYear>
</BookCopyright>
<BookSubjectGroup>
<BookSubject Code="I" Type="Primary">Computer Science</BookSubject>
<BookSubject Code="I15033" Priority="1" Type="Secondary">Data Encryption</BookSubject>
<BookSubject Code="I14045" Priority="2" Type="Secondary">Operating Systems</BookSubject>
<BookSubject Code="I13022" Priority="3" Type="Secondary">Computer Communication Networks</BookSubject>
<BookSubject Code="I18024" Priority="4" Type="Secondary">Database Management</BookSubject>
<BookSubject Code="I24067" Priority="5" Type="Secondary">Management of Computing and Information Systems</BookSubject>
<BookSubject Code="I24040" Priority="6" Type="Secondary">Computers and Society</BookSubject>
<SubjectCollection Code="SUCO11645">Computer Science</SubjectCollection>
</BookSubjectGroup>
</BookInfo>
<BookHeader>
<EditorGroup>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Joachim</GivenName>
<FamilyName>Biskup</FamilyName>
</EditorName>
<Contact>
<Email>biskup@ls6.cs.uni-dortmund.de</Email>
</Contact>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Javier</GivenName>
<FamilyName>López</FamilyName>
</EditorName>
<Contact>
<Email>jlm@lcc.uma.es</Email>
</Contact>
</Editor>
</EditorGroup>
</BookHeader>
<Part ID="Part3">
<PartInfo TocLevels="0">
<PartID>3</PartID>
<PartSequenceNumber>3</PartSequenceNumber>
<PartTitle>Access Control I</PartTitle>
<PartChapterCount>3</PartChapterCount>
<PartContext>
<SeriesID>558</SeriesID>
<BookTitle>Computer Security – ESORICS 2007</BookTitle>
</PartContext>
</PartInfo>
<Chapter ID="Chap6" Language="En">
<ChapterInfo ChapterType="OriginalPaper" ContainsESM="No" NumberingStyle="Unnumbered" TocLevels="0">
<ChapterID>6</ChapterID>
<ChapterDOI>10.1007/978-3-540-74835-9_6</ChapterDOI>
<ChapterSequenceNumber>6</ChapterSequenceNumber>
<ChapterTitle Language="En">Conditional Privacy-Aware Role Based Access Control</ChapterTitle>
<ChapterFirstPage>72</ChapterFirstPage>
<ChapterLastPage>89</ChapterLastPage>
<ChapterCopyright>
<CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2007</CopyrightYear>
</ChapterCopyright>
<ChapterGrants Type="Regular">
<MetadataGrant Grant="OpenAccess"></MetadataGrant>
<AbstractGrant Grant="OpenAccess"></AbstractGrant>
<BodyPDFGrant Grant="Restricted"></BodyPDFGrant>
<BodyHTMLGrant Grant="Restricted"></BodyHTMLGrant>
<BibliographyGrant Grant="Restricted"></BibliographyGrant>
<ESMGrant Grant="Restricted"></ESMGrant>
</ChapterGrants>
<ChapterContext>
<SeriesID>558</SeriesID>
<PartID>3</PartID>
<BookID>978-3-540-74835-9</BookID>
<BookTitle>Computer Security – ESORICS 2007</BookTitle>
</ChapterContext>
</ChapterInfo>
<ChapterHeader>
<AuthorGroup>
<Author AffiliationIDS="Aff1">
<AuthorName DisplayOrder="Western">
<GivenName>Qun</GivenName>
<FamilyName>Ni</FamilyName>
</AuthorName>
<Contact>
<Email>ni@cs.purdue.edu</Email>
</Contact>
</Author>
<Author AffiliationIDS="Aff1">
<AuthorName DisplayOrder="Western">
<GivenName>Dan</GivenName>
<FamilyName>Lin</FamilyName>
</AuthorName>
<Contact>
<Email>lindan@cs.purdue.edu</Email>
</Contact>
</Author>
<Author AffiliationIDS="Aff1">
<AuthorName DisplayOrder="Western">
<GivenName>Elisa</GivenName>
<FamilyName>Bertino</FamilyName>
</AuthorName>
<Contact>
<Email>bertino@cs.purdue.edu</Email>
</Contact>
</Author>
<Author AffiliationIDS="Aff2">
<AuthorName DisplayOrder="Western">
<GivenName>Jorge</GivenName>
<FamilyName>Lobo</FamilyName>
</AuthorName>
<Contact>
<Email>jlobo@us.ibm.com</Email>
</Contact>
</Author>
<Affiliation ID="Aff1">
<OrgName>Department of Computer Science, Purdue University, W. Lafayette, IN 47907</OrgName>
<OrgAddress>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff2">
<OrgName>IBM Watson Research Center, Hawthorne, NY 10598</OrgName>
<OrgAddress>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
</AuthorGroup>
<Abstract ID="Abs1" Language="En">
<Heading>Abstract</Heading>
<Para>Privacy is considered critical for all organizations needing to manage individual related information. As such, there is an increasing need for access control models which can adequately support the specification and enforcement of privacy policies. In this paper, we propose a model, referred to as Conditional Privacy-aware Role Based Access Control (P-RBAC), which supports expressive condition languages and flexible relations among permission assignments for more complex privacy policies. Efficient algorithms for detecting conflicts, redundancies, and indeterminism for a set of permission assignments are presented. In the paper we also extend Conditional P-RBAC to Universal P-RBAC by taking into account hierarchical relations among roles, data and purposes. In comparison with other approaches, such as P3P, EPAL, and XACML, our work has achieved both expressiveness and efficiency.</Para>
</Abstract>
</ChapterHeader>
<NoBody></NoBody>
</Chapter>
</Part>
</Book>
</Series>
</Publisher>
</istex:document>
</istex:metadataXml>
<mods version="3.6">
<titleInfo lang="en">
<title>Conditional Privacy-Aware Role Based Access Control</title>
</titleInfo>
<titleInfo type="alternative" contentType="CDATA" lang="en">
<title>Conditional Privacy-Aware Role Based Access Control</title>
</titleInfo>
<name type="personal">
<namePart type="given">Qun</namePart>
<namePart type="family">Ni</namePart>
<affiliation>Department of Computer Science, Purdue University, W. Lafayette, IN 47907, USA</affiliation>
<affiliation>E-mail: ni@cs.purdue.edu</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Dan</namePart>
<namePart type="family">Lin</namePart>
<affiliation>Department of Computer Science, Purdue University, W. Lafayette, IN 47907, USA</affiliation>
<affiliation>E-mail: lindan@cs.purdue.edu</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Elisa</namePart>
<namePart type="family">Bertino</namePart>
<affiliation>Department of Computer Science, Purdue University, W. Lafayette, IN 47907, USA</affiliation>
<affiliation>E-mail: bertino@cs.purdue.edu</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Jorge</namePart>
<namePart type="family">Lobo</namePart>
<affiliation>IBM Watson Research Center, Hawthorne, NY 10598, USA</affiliation>
<affiliation>E-mail: jlobo@us.ibm.com</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<typeOfResource>text</typeOfResource>
<genre type="conference [eBooks]" displayLabel="OriginalPaper"></genre>
<originInfo>
<publisher>Springer Berlin Heidelberg</publisher>
<place>
<placeTerm type="text">Berlin, Heidelberg</placeTerm>
</place>
<dateIssued encoding="w3cdtf">2007</dateIssued>
<copyrightDate encoding="w3cdtf">2007</copyrightDate>
</originInfo>
<language>
<languageTerm type="code" authority="rfc3066">en</languageTerm>
<languageTerm type="code" authority="iso639-2b">eng</languageTerm>
</language>
<physicalDescription>
<internetMediaType>text/html</internetMediaType>
</physicalDescription>
<abstract lang="en">Abstract: Privacy is considered critical for all organizations needing to manage individual related information. As such, there is an increasing need for access control models which can adequately support the specification and enforcement of privacy policies. In this paper, we propose a model, referred to as Conditional Privacy-aware Role Based Access Control (P-RBAC), which supports expressive condition languages and flexible relations among permission assignments for more complex privacy policies. Efficient algorithms for detecting conflicts, redundancies, and indeterminism for a set of permission assignments are presented. In the paper we also extend Conditional P-RBAC to Universal P-RBAC by taking into account hierarchical relations among roles, data and purposes. In comparison with other approaches, such as P3P, EPAL, and XACML, our work has achieved both expressiveness and efficiency.</abstract>
<relatedItem type="host">
<titleInfo>
<title>Computer Security – ESORICS 2007</title>
<subTitle>12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 — 26, 2007. Proceedings</subTitle>
</titleInfo>
<name type="personal">
<namePart type="given">Joachim</namePart>
<namePart type="family">Biskup</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Javier</namePart>
<namePart type="family">López</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<genre type="Book Series" displayLabel="Proceedings"></genre>
<originInfo>
<copyrightDate encoding="w3cdtf">2007</copyrightDate>
<issuance>monographic</issuance>
</originInfo>
<subject>
<genre>Book Subject Collection</genre>
<topic authority="SpringerSubjectCodes" authorityURI="SUCO11645">Computer Science</topic>
</subject>
<subject>
<genre>Book Subject Group</genre>
<topic authority="SpringerSubjectCodes" authorityURI="I">Computer Science</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I15033">Data Encryption</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I14045">Operating Systems</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I13022">Computer Communication Networks</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I18024">Database Management</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I24067">Management of Computing and Information Systems</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I24040">Computers and Society</topic>
</subject>
<identifier type="DOI">10.1007/978-3-540-74835-9</identifier>
<identifier type="ISBN">978-3-540-74834-2</identifier>
<identifier type="eISBN">978-3-540-74835-9</identifier>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="BookTitleID">152394</identifier>
<identifier type="BookID">978-3-540-74835-9</identifier>
<identifier type="BookChapterCount">40</identifier>
<identifier type="BookVolumeNumber">4734</identifier>
<identifier type="BookSequenceNumber">4734</identifier>
<identifier type="PartChapterCount">3</identifier>
<part>
<date>2007</date>
<detail type="part">
<title>Access Control I</title>
</detail>
<detail type="volume">
<number>4734</number>
<caption>vol.</caption>
</detail>
<extent unit="pages">
<start>72</start>
<end>89</end>
</extent>
</part>
<recordInfo>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2007</recordOrigin>
</recordInfo>
</relatedItem>
<relatedItem type="series">
<titleInfo>
<title>Lecture Notes in Computer Science</title>
</titleInfo>
<name type="personal">
<namePart type="given">David</namePart>
<namePart type="family">Hutchison</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Takeo</namePart>
<namePart type="family">Kanade</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Josef</namePart>
<namePart type="family">Kittler</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Jon</namePart>
<namePart type="given">M.</namePart>
<namePart type="family">Kleinberg</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Friedemann</namePart>
<namePart type="family">Mattern</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">John</namePart>
<namePart type="given">C.</namePart>
<namePart type="family">Mitchell</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Moni</namePart>
<namePart type="family">Naor</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Oscar</namePart>
<namePart type="family">Nierstrasz</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">C.</namePart>
<namePart type="family">Pandu Rangan</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Bernhard</namePart>
<namePart type="family">Steffen</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Madhu</namePart>
<namePart type="family">Sudan</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Demetri</namePart>
<namePart type="family">Terzopoulos</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Doug</namePart>
<namePart type="family">Tygar</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Moshe</namePart>
<namePart type="given">Y.</namePart>
<namePart type="family">Vardi</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Gerhard</namePart>
<namePart type="family">Weikum</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<originInfo>
<copyrightDate encoding="w3cdtf">2007</copyrightDate>
<issuance>serial</issuance>
</originInfo>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="SeriesID">558</identifier>
<recordInfo>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2007</recordOrigin>
</recordInfo>
</relatedItem>
<identifier type="istex">34F8C52F07805E9FD4D7020AF548BDE3E86D576F</identifier>
<identifier type="DOI">10.1007/978-3-540-74835-9_6</identifier>
<identifier type="ChapterID">6</identifier>
<identifier type="ChapterID">Chap6</identifier>
<accessCondition type="use and reproduction" contentType="copyright">Springer-Verlag Berlin Heidelberg, 2007</accessCondition>
<recordInfo>
<recordContentSource>SPRINGER</recordContentSource>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2007</recordOrigin>
</recordInfo>
</mods>
</metadata>
<enrichments>
<istex:refBibTEI uri="https://api.istex.fr/document/34F8C52F07805E9FD4D7020AF548BDE3E86D576F/enrichments/refBib">
<teiHeader></teiHeader>
<text>
<front></front>
<body></body>
<back>
<listBibl>
<biblStruct xml:id="b0">
<analytic>
<title level="a" type="main">Policy ratification</title>
<author>
<persName>
<forename type="first">D</forename>
<surname>Agrawal</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">J</forename>
<surname>Giles</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">K.-W</forename>
<surname>Lee</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">J</forename>
<surname>Lobo</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">Proceedings of the Sixth IEEE International Workshop on Policies for Distributed Systems and Networks</title>
<meeting>the Sixth IEEE International Workshop on Policies for Distributed Systems and Networks
<address>
<addrLine>Stockholm Sweden ; Los Alamitos</addrLine>
</address>
</meeting>
<imprint>
<publisher>IEEE Computer Society</publisher>
<date type="published" when="2005"></date>
<biblScope unit="page" from="223" to="232"></biblScope>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b1">
<monogr>
<title level="m" type="main">Amazon privacy notice</title>
<author>
<persName>
<surname>Amazon</surname>
</persName>
</author>
<imprint></imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b2">
<analytic>
<title level="a" type="main">A comparison of two privacy policy languages: Epal and xacml</title>
<author>
<persName>
<forename type="first">A</forename>
<forename type="middle">H</forename>
<surname>Anderson</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">SWS '06: Proceedings of the 3rd ACM workshop on Secure web services</title>
<meeting>
<address>
<addrLine>New York</addrLine>
</address>
</meeting>
<imprint>
<publisher>ACM Press</publisher>
<date type="published" when="2006"></date>
<biblScope unit="page" from="53" to="60"></biblScope>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b3">
<analytic>
<title level="a" type="main">Enterprise privacy authorization language (epal 1.2) W3C Member Submission 10 Conflict and combination in privacy policy languages</title>
<author>
<persName>
<forename type="first">P</forename>
<surname>Ashley</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">S</forename>
<surname>Hada</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">G</forename>
<surname>Karjoth</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">C</forename>
<surname>Powers</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">M</forename>
<surname>Schunter</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">A</forename>
<surname>Barth</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">J</forename>
<forename type="middle">C</forename>
<surname>Mitchell</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">J</forename>
<surname>Rosenstein</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">Proceedings of the 2004 ACM workshop on Privacy in the electronic society</title>
<meeting>the 2004 ACM workshop on Privacy in the electronic society
<address>
<addrLine>New York</addrLine>
</address>
</meeting>
<imprint>
<publisher>ACM Press</publisher>
<date type="published" when="2003-11"></date>
<biblScope unit="page" from="45" to="46"></biblScope>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b4">
<analytic>
<title level="a" type="main">Obligation monitoring in policy management</title>
<author>
<persName>
<forename type="first">C</forename>
<surname>Bettini</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">S</forename>
<surname>Jajodia</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">X</forename>
<surname>Wang</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">D</forename>
<surname>Wijesekera</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks</title>
<meeting>the 3rd International Workshop on Policies for Distributed Systems and Networks
<address>
<addrLine>Washington, DC, USA ; Los Alamitos</addrLine>
</address>
</meeting>
<imprint>
<publisher>IEEE Computer Society</publisher>
<date type="published" when="2002"></date>
<biblScope unit="page">2</biblScope>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b5">
<analytic>
<title level="a" type="main">Proposed nist standard for role-based access control</title>
<author>
<persName>
<forename type="first">D</forename>
<forename type="middle">F</forename>
<surname>Ferraiolo</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">R</forename>
<surname>Sandhu</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">S</forename>
<surname>Gavrila</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">D</forename>
<forename type="middle">R</forename>
<surname>Kuhn</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">R</forename>
<surname>Chandramouli</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="j">ACM Trans. Inf. Syst. Secur</title>
<imprint>
<biblScope unit="volume">4</biblScope>
<biblScope unit="issue">3</biblScope>
<biblScope unit="page" from="224" to="274"></biblScope>
<date type="published" when="2001"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b6">
<monogr>
<title level="m" type="main">IT-security and privacy: design and use of privacy-enhancing security mechanisms</title>
<author>
<persName>
<forename type="first">S</forename>
<surname>Fischer-Hubner</surname>
</persName>
</author>
<imprint>
<date type="published" when="2001"></date>
<publisher>Springer</publisher>
<pubPlace>Heidelberg</pubPlace>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b7">
<analytic>
<title level="a" type="main">Verification and change-impact analysis of access-control policies</title>
<author>
<persName>
<forename type="first">K</forename>
<surname>Fisler</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">S</forename>
<surname>Krishnamurthi</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">L</forename>
<forename type="middle">A</forename>
<surname>Meyerovich</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">M</forename>
<forename type="middle">C</forename>
<surname>Tschantz</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">ICSE 2005</title>
<editor>Inverardi, P., Jazayeri, M.</editor>
<meeting>
<address>
<addrLine>Heidelberg</addrLine>
</address>
</meeting>
<imprint>
<publisher>Springer</publisher>
<date type="published" when="2006"></date>
<biblScope unit="page" from="196" to="205"></biblScope>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b8">
<monogr>
<title level="m" type="main">Switzerland: The enterprise privacy authorization language (epal 1.1), available at http://www.zurich.ibm</title>
<imprint></imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b9">
<analytic>
<title level="a" type="main">On the modeling and analysis of obligations</title>
<author>
<persName>
<forename type="first">K</forename>
<surname>Irwin</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">T</forename>
<surname>Yu</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">W</forename>
<forename type="middle">H</forename>
<surname>Winsborough</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">CCS '06: Proceedings of the 13th ACM conference on Computer and communications security</title>
<meeting>
<address>
<addrLine>New York</addrLine>
</address>
</meeting>
<imprint>
<publisher>ACM Press</publisher>
<date type="published" when="2006"></date>
<biblScope unit="page" from="134" to="143"></biblScope>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b10">
<analytic>
<title level="a" type="main">Constraint query languages (preliminary report)</title>
<author>
<persName>
<forename type="first">P</forename>
<forename type="middle">C</forename>
<surname>Kanellakis</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">G</forename>
<forename type="middle">M</forename>
<surname>Kuper</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">P</forename>
<forename type="middle">Z</forename>
<surname>Revesz</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">PODS '90: Proceedings of the ninth ACM SIGACT-SIGMOD- SIGART symposium on Principles of database systems</title>
<meeting>
<address>
<addrLine>New York</addrLine>
</address>
</meeting>
<imprint>
<publisher>ACM Press</publisher>
<date type="published" when="1990"></date>
<biblScope unit="page" from="299" to="313"></biblScope>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b11">
<analytic>
<title level="a" type="main">Platform for enterprise privacy practices: Privacy-enabled management of customer data</title>
<author>
<persName>
<forename type="first">G</forename>
<surname>Karjoth</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">M</forename>
<surname>Schunter</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">M</forename>
<surname>Waidner</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="j">LNCS</title>
<editor>Dingledine, R., Syverson, P.F.</editor>
<imprint>
<publisher>Springer</publisher>
<publisher>Springer</publisher>
<biblScope unit="volume">2482</biblScope>
<biblScope unit="page" from="69" to="84"></biblScope>
<date type="published" when="2002"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b12">
<monogr>
<title level="m" type="main">Formalizing xacml using defeasible description logics</title>
<author>
<persName>
<forename type="first">V</forename>
<surname>Kolovski</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">J</forename>
<surname>Hendler</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">B</forename>
<surname>Parsia</surname>
</persName>
</author>
<imprint></imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b13">
<analytic>
<title level="a" type="main">Datalog with constraints: A foundation for trust management languages</title>
<author>
<persName>
<forename type="first">N</forename>
<surname>Li</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">J</forename>
<forename type="middle">C</forename>
<surname>Mitchell</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">PADL 2003</title>
<editor>Dahl, V., Wadler, P.</editor>
<meeting>
<address>
<addrLine>Heidelberg</addrLine>
</address>
</meeting>
<imprint>
<publisher>Springer</publisher>
<date type="published" when="2002"></date>
<biblScope unit="page" from="58" to="73"></biblScope>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b14">
<monogr>
<title level="m" type="main">On parametric obligation policies: Enabling privacyaware information lifecycle management in enterprises</title>
<author>
<persName>
<forename type="first">M</forename>
<forename type="middle">C</forename>
<surname>Mont</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">F</forename>
<surname>Beato</surname>
</persName>
</author>
<imprint></imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b15">
<analytic>
<title level="a" type="main">Privacy aware role based access control</title>
<author>
<persName>
<forename type="first">Q</forename>
<surname>Ni</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">A</forename>
<surname>Trombetta</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">E</forename>
<surname>Bertino</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">J</forename>
<surname>Lobo</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">SACMAT '07. Proceedings of the 12th ACM symposium on Access control models and technologies</title>
<meeting>
<address>
<addrLine>Sophia Antipolis, France</addrLine>
</address>
</meeting>
<imprint>
<publisher>ACM Press</publisher>
<date type="published" when="2007"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b16">
<monogr>
<title level="m" type="main">Organisation for Economic Co-operation and Development: Oecd guidelines on the protection of privacy and transborder flows of personal data of</title>
<imprint>
<date type="published" when="1980"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b17">
<analytic>
<title level="a" type="main">Privacy promises, access control, and privacy management</title>
<author>
<persName>
<forename type="first">C</forename>
<forename type="middle">S</forename>
<surname>Powers</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">ISEC '02: Proceedings of the Third International Symposium on Electronic Commerce</title>
<meeting>
<address>
<addrLine>Washington, DC, USA ; Los Alamitos</addrLine>
</address>
</meeting>
<imprint>
<publisher>IEEE Computer Society</publisher>
<date type="published" when="2002"></date>
<biblScope unit="page">13</biblScope>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b18">
<analytic>
<title level="a" type="main">Constraint databases: A survey</title>
<author>
<persName>
<forename type="first">P</forename>
<forename type="middle">Z</forename>
<surname>Revesz</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">Semantics in Databases</title>
<editor>Thalheim, B.</editor>
<meeting>
<address>
<addrLine>Heidelberg</addrLine>
</address>
</meeting>
<imprint>
<publisher>Springer</publisher>
<date type="published" when="1998"></date>
<biblScope unit="page" from="209" to="246"></biblScope>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b19">
<analytic>
<title level="a" type="main">Safe datalog queries with linear constraints</title>
<author>
<persName>
<forename type="first">P</forename>
<forename type="middle">Z</forename>
<surname>Revesz</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">CP 1998</title>
<editor>Maher, M.J., Puget, J.-F.</editor>
<meeting>
<address>
<addrLine>Heidelberg</addrLine>
</address>
</meeting>
<imprint>
<publisher>Springer</publisher>
<date type="published" when="1998"></date>
<biblScope unit="page" from="355" to="369"></biblScope>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b20">
<analytic>
<title level="a" type="main">Role-based access control models</title>
<author>
<persName>
<forename type="first">R</forename>
<forename type="middle">S</forename>
<surname>Sandhu</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">E</forename>
<forename type="middle">J</forename>
<surname>Coyne</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">H</forename>
<forename type="middle">L</forename>
<surname>Feinstein</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">C</forename>
<forename type="middle">E</forename>
<surname>Youman</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="j">IEEE Computer</title>
<imprint>
<biblScope unit="volume">29</biblScope>
<biblScope unit="issue">2</biblScope>
<biblScope unit="page" from="38" to="47"></biblScope>
<date type="published" when="1996"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b21">
<monogr>
<title level="m" type="main">Grand challenges in information security: Process and output</title>
<author>
<persName>
<forename type="first">S</forename>
<forename type="middle">W</forename>
<surname>Smith</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">E</forename>
<forename type="middle">H</forename>
<surname>Spafford</surname>
</persName>
</author>
<imprint>
<date type="published" when="2004-01"></date>
<publisher>IEEE Security and Privacy</publisher>
<biblScope unit="page" from="69" to="71"></biblScope>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b22">
<monogr>
<title level="m" type="main">org: An independent, nonprofit enabling trust based on privacy for personal information on the internet</title>
<author>
<persName>
<surname>Truste</surname>
</persName>
</author>
<imprint></imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b23">
<monogr>
<title level="m" type="main">Towards reasonability properties for accesscontrol policy languages with extended xacml analysis. Tech. Report CS-06- 04 United State Department of Health: Health insurance portability and accountability act of</title>
<author>
<persName>
<forename type="first">M</forename>
<forename type="middle">C</forename>
<surname>Tschantz</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">S</forename>
<surname>Krishnamurthi</surname>
</persName>
</author>
<imprint>
<date type="published" when="1996"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b24">
<monogr>
<title level="m" type="main">Senate Committee on Banking, Housing, and Urban Affairs: Information regarding the gramm-leach-bliley act of 1999</title>
<author>
<persName>
<forename type="first">U</forename>
<forename type="middle">S</forename>
</persName>
</author>
<imprint></imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b25">
<monogr>
<title level="m" type="main">W3C: Platform for privacy preferences (p3p) project</title>
<imprint></imprint>
</monogr>
</biblStruct>
</listBibl>
</back>
</text>
</istex:refBibTEI>
</enrichments>
</istex>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/OcrV1/Data/Istex/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 002717 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Istex/Corpus/biblio.hfd -nk 002717 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Ticri/CIDE
   |area=    OcrV1
   |flux=    Istex
   |étape=   Corpus
   |type=    RBID
   |clé=     ISTEX:34F8C52F07805E9FD4D7020AF548BDE3E86D576F
   |texte=   Conditional Privacy-Aware Role Based Access Control
}}

Wicri

This area was generated with Dilib version V0.6.32.
Data generation: Sat Nov 11 16:53:45 2017. Site generation: Mon Mar 11 23:15:16 2024