2009
DOI: 10.1109/msp.2009.102
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Aware Role-Based Access Control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
70
0
3

Year Published

2010
2010
2021
2021

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 96 publications
(73 citation statements)
references
References 12 publications
0
70
0
3
Order By: Relevance
“…Bünnig and Cap [12] describe privacy as protecting personal information from being misused by malicious entities and allowing certain authorised entities to access that personal information by making it visible to them. While, Ni et al [13] define privacy as a set of policies that force the system to protect private information.…”
Section: Privacy Definitionmentioning
confidence: 99%
“…Bünnig and Cap [12] describe privacy as protecting personal information from being misused by malicious entities and allowing certain authorised entities to access that personal information by making it visible to them. While, Ni et al [13] define privacy as a set of policies that force the system to protect private information.…”
Section: Privacy Definitionmentioning
confidence: 99%
“…Basin et al [5] show how to describe privacy policies in metric first-order temporal logic (MFOTL), and how to build a component that monitors in realtime whether these policies are being violated. Nissenbaum et al [4] also describe privacy policies using linear temporal logic (LTL), and this has inspired a lot of research into systems such as P-RBAC, which enforces low-level privacy-related conditions at run-time [17]. Most of this research has concentrated on verifying at run-time whether or not a given action is permitted by a given set of privacy policies.…”
Section: Related Workmentioning
confidence: 99%
“…A policy redundancy detection method based on Chang-Impact analysis was presented in this paper; however, no corresponding detection model was proposed and the support and application of this detection technique were absent. Besides the above researches, policy redundancies can be detected by classifying the subject based on the security level and role [21,22], and then all policy redundancies can be eliminated by revising policies.…”
Section: Mathematical Problems In Engineeringmentioning
confidence: 99%