Serveur d'exploration sur l'OCR

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Conditional Privacy-Aware Role Based Access Control

Identifieur interne : 000E92 ( Main/Merge ); précédent : 000E91; suivant : 000E93

Conditional Privacy-Aware Role Based Access Control

Auteurs : Qun Ni [États-Unis] ; Dan Lin [États-Unis] ; Elisa Bertino [États-Unis] ; Jorge Lobo [États-Unis]

Source :

RBID : ISTEX:34F8C52F07805E9FD4D7020AF548BDE3E86D576F

Abstract

Abstract: Privacy is considered critical for all organizations needing to manage individual related information. As such, there is an increasing need for access control models which can adequately support the specification and enforcement of privacy policies. In this paper, we propose a model, referred to as Conditional Privacy-aware Role Based Access Control (P-RBAC), which supports expressive condition languages and flexible relations among permission assignments for more complex privacy policies. Efficient algorithms for detecting conflicts, redundancies, and indeterminism for a set of permission assignments are presented. In the paper we also extend Conditional P-RBAC to Universal P-RBAC by taking into account hierarchical relations among roles, data and purposes. In comparison with other approaches, such as P3P, EPAL, and XACML, our work has achieved both expressiveness and efficiency.

Url:
DOI: 10.1007/978-3-540-74835-9_6

Links toward previous steps (curation, corpus...)


Links to Exploration step

ISTEX:34F8C52F07805E9FD4D7020AF548BDE3E86D576F

Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Conditional Privacy-Aware Role Based Access Control</title>
<author>
<name sortKey="Ni, Qun" sort="Ni, Qun" uniqKey="Ni Q" first="Qun" last="Ni">Qun Ni</name>
</author>
<author>
<name sortKey="Lin, Dan" sort="Lin, Dan" uniqKey="Lin D" first="Dan" last="Lin">Dan Lin</name>
</author>
<author>
<name sortKey="Bertino, Elisa" sort="Bertino, Elisa" uniqKey="Bertino E" first="Elisa" last="Bertino">Elisa Bertino</name>
</author>
<author>
<name sortKey="Lobo, Jorge" sort="Lobo, Jorge" uniqKey="Lobo J" first="Jorge" last="Lobo">Jorge Lobo</name>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:34F8C52F07805E9FD4D7020AF548BDE3E86D576F</idno>
<date when="2007" year="2007">2007</date>
<idno type="doi">10.1007/978-3-540-74835-9_6</idno>
<idno type="url">https://api.istex.fr/document/34F8C52F07805E9FD4D7020AF548BDE3E86D576F/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">002717</idno>
<idno type="wicri:Area/Istex/Curation">002535</idno>
<idno type="wicri:Area/Istex/Checkpoint">000894</idno>
<idno type="wicri:doubleKey">0302-9743:2007:Ni Q:conditional:privacy:aware</idno>
<idno type="wicri:Area/Main/Merge">000E92</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Conditional Privacy-Aware Role Based Access Control</title>
<author>
<name sortKey="Ni, Qun" sort="Ni, Qun" uniqKey="Ni Q" first="Qun" last="Ni">Qun Ni</name>
<affiliation wicri:level="2">
<country xml:lang="fr">États-Unis</country>
<wicri:regionArea>Department of Computer Science, Purdue University, W. Lafayette, IN 47907</wicri:regionArea>
<placeName>
<region type="state">Indiana</region>
</placeName>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">États-Unis</country>
</affiliation>
</author>
<author>
<name sortKey="Lin, Dan" sort="Lin, Dan" uniqKey="Lin D" first="Dan" last="Lin">Dan Lin</name>
<affiliation wicri:level="2">
<country xml:lang="fr">États-Unis</country>
<wicri:regionArea>Department of Computer Science, Purdue University, W. Lafayette, IN 47907</wicri:regionArea>
<placeName>
<region type="state">Indiana</region>
</placeName>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">États-Unis</country>
</affiliation>
</author>
<author>
<name sortKey="Bertino, Elisa" sort="Bertino, Elisa" uniqKey="Bertino E" first="Elisa" last="Bertino">Elisa Bertino</name>
<affiliation wicri:level="2">
<country xml:lang="fr">États-Unis</country>
<wicri:regionArea>Department of Computer Science, Purdue University, W. Lafayette, IN 47907</wicri:regionArea>
<placeName>
<region type="state">Indiana</region>
</placeName>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">États-Unis</country>
</affiliation>
</author>
<author>
<name sortKey="Lobo, Jorge" sort="Lobo, Jorge" uniqKey="Lobo J" first="Jorge" last="Lobo">Jorge Lobo</name>
<affiliation wicri:level="2">
<country xml:lang="fr">États-Unis</country>
<wicri:regionArea>IBM Watson Research Center, Hawthorne, NY 10598</wicri:regionArea>
<placeName>
<region type="state">État de New York</region>
</placeName>
</affiliation>
<affiliation>
<wicri:noCountry code="no comma">E-mail: jlobo@us.ibm.com</wicri:noCountry>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<imprint>
<date>2007</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
<idno type="istex">34F8C52F07805E9FD4D7020AF548BDE3E86D576F</idno>
<idno type="DOI">10.1007/978-3-540-74835-9_6</idno>
<idno type="ChapterID">6</idno>
<idno type="ChapterID">Chap6</idno>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
<langUsage>
<language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: Privacy is considered critical for all organizations needing to manage individual related information. As such, there is an increasing need for access control models which can adequately support the specification and enforcement of privacy policies. In this paper, we propose a model, referred to as Conditional Privacy-aware Role Based Access Control (P-RBAC), which supports expressive condition languages and flexible relations among permission assignments for more complex privacy policies. Efficient algorithms for detecting conflicts, redundancies, and indeterminism for a set of permission assignments are presented. In the paper we also extend Conditional P-RBAC to Universal P-RBAC by taking into account hierarchical relations among roles, data and purposes. In comparison with other approaches, such as P3P, EPAL, and XACML, our work has achieved both expressiveness and efficiency.</div>
</front>
</TEI>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/OcrV1/Data/Main/Merge
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000E92 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Main/Merge/biblio.hfd -nk 000E92 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Ticri/CIDE
   |area=    OcrV1
   |flux=    Main
   |étape=   Merge
   |type=    RBID
   |clé=     ISTEX:34F8C52F07805E9FD4D7020AF548BDE3E86D576F
   |texte=   Conditional Privacy-Aware Role Based Access Control
}}

Wicri

This area was generated with Dilib version V0.6.32.
Data generation: Sat Nov 11 16:53:45 2017. Site generation: Mon Mar 11 23:15:16 2024