2010
DOI: 10.1007/978-3-642-11207-2_10
|View full text |Cite
|
Sign up to set email alerts
|

Contextual Privacy Management in Extended Role Based Access Control Model

Abstract: Abstract. Typically, informational privacy aims to protect personal data from unauthorized access. In this paper, we propose to use the OrBAC model enhanced by some concepts to model privacy policies. We will take into account the concepts of consent, accuracy, purposes of the access and provisional obligation within role-based access control model. First, we focus on modelling of the requirement of the data owner consent before delivering the sensitive data. The subscriber defines that he must be notified bef… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0
4

Year Published

2010
2010
2015
2015

Publication Types

Select...
4
3
1

Relationship

5
3

Authors

Journals

citations
Cited by 19 publications
(28 citation statements)
references
References 6 publications
0
24
0
4
Order By: Relevance
“…The approach we apply in the EPCglobal middleware is policy-driven. It ensures the following features: (i) enforcing a privacy policy without interfering with the standard middleware interface, (ii) using an existing privacy-aware model [1] to store and manage privacy policy preferences, and (iii) taking into account the declared purpose, the accuracy and the consent dimensions as privacy requirements. To show the feasibility of our approach, we provide a proof-ofconcept prototype that we apply on the open-source software for track and trace Fosstrak [7].…”
Section: Introductionmentioning
confidence: 99%
“…The approach we apply in the EPCglobal middleware is policy-driven. It ensures the following features: (i) enforcing a privacy policy without interfering with the standard middleware interface, (ii) using an existing privacy-aware model [1] to store and manage privacy policy preferences, and (iii) taking into account the declared purpose, the accuracy and the consent dimensions as privacy requirements. To show the feasibility of our approach, we provide a proof-ofconcept prototype that we apply on the open-source software for track and trace Fosstrak [7].…”
Section: Introductionmentioning
confidence: 99%
“…We defined the notion of meta-criterion to represent abstractions of access control models like the role in RBAC [11], views and activities in OrBAC [15], purposes hierarchies in PRBAC [12], etc. The prefix meta in the scientific vocabulary allows to designate a higher level of abstraction.…”
Section: Meta-criteriamentioning
confidence: 99%
“…The abstraction of roles limits the number of rules. Other notions and abstractions have been introduced in access control models to facilitate the definition and management of authorization policies especially for privacy like the concept of purpose [12], sensitivity of a resource [13], trust [14], accuracy or consent [15]. These access control models offer the possibility to write high level rules that are suited to complex environment.…”
Section: Introductionmentioning
confidence: 99%
“…OrBAC provides a mature framework for managing contextual policies, and several extensions, e.g., for dynamically deploying security policies [40], whereas a privacy-enhancing version of OrBAC is presented in [43]. However, the contextual representation of privacy concepts decreases the flexibility of the resulting model, since it limits the integration of complex structures of actions (e.g., paths or subworkflows) that may benefit from automatically being evaluated at design time.…”
Section: Related Workmentioning
confidence: 99%
“…Although this could be modelled as a special context (like in [43]), we have chosen to treat purpose as a stand-alone concept, in order to highlight its significance regarding privacy-awareness, as well as distinguish it from realtime parameters and events. Thus, the Purposes (Pu) set is defined, with its members forming hierarchies by means of OR (isA) relations modelling particularisation of a high level purpose to more specific ones; for instance, a purpose PerimeterSecurity specialises the more general purpose NetworkSecurity.…”
Section: Purposesmentioning
confidence: 99%