2019 IEEE 35th International Conference on Data Engineering (ICDE) 2019
DOI: 10.1109/icde.2019.00227
|View full text |Cite
|
Sign up to set email alerts
|

PePPer: Fine-Grained Personal Access Control via Peer Probing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…A collaborative access control tool is suggested in [38], where peers are actively probed to ask for their permissions. This tool is especially important when it is difficult to identify the data owner or when it is unknown in advance how the data will be processed.…”
Section: Background and Related Workmentioning
confidence: 99%
“…A collaborative access control tool is suggested in [38], where peers are actively probed to ask for their permissions. This tool is especially important when it is difficult to identify the data owner or when it is unknown in advance how the data will be processed.…”
Section: Background and Related Workmentioning
confidence: 99%
“…These include system testing, e.g., [8,44] (where it is called Sequential System Testing or Sequential Diagnosis), BDD design, e.g., [13,18,31] (where it is also called Discrete Function Evaluation), active learning [24] (where it is a particular case of Bayesian Active Learning) and its connection to other problems such as Stochastic Set Cover [15,29] (where it is termed Stochastic Boolean Function Evaluation (SBFE)). Boolean Evaluation is also a component of Consent Management [6,17], where the choice of variables to observe coincides with requests to attain consent to use specific input tuples. Many of these studies focus on optimization goals different than ours, most notably the expected number of observed variables under a probabilistic model [2,6,8,13,15,17,29,31,44], corresponding to the expected path length in a BDD; but other alternatives such as minimizing the size of the BDD have been considered [19].…”
Section: Related Workmentioning
confidence: 99%
“…Boolean Evaluation is also a component of Consent Management [6,17], where the choice of variables to observe coincides with requests to attain consent to use specific input tuples. Many of these studies focus on optimization goals different than ours, most notably the expected number of observed variables under a probabilistic model [2,6,8,13,15,17,29,31,44], corresponding to the expected path length in a BDD; but other alternatives such as minimizing the size of the BDD have been considered [19].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation