Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society 2019
DOI: 10.1145/3338498.3358643
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Multi-Party Access Control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
13
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(13 citation statements)
references
References 36 publications
0
13
0
Order By: Relevance
“…The list of common customers can be used to plan promotions for such customers [14]; MPSI can be used among the community of medical professionals to find out the patients of a hospital who has participated in the medical tests of different research labs [15]; MPSI can also be used in multi-party access control, where several coowners of a common content each specify a set of users who are permitted to access data. The ones in the intersection are allowed to access the content [16]; MPSI can be employed among several enterprises which have private audit logs of connections to their corporate networks and are interested in identifying similar activities in all networks [17].…”
Section: Introductionmentioning
confidence: 99%
“…The list of common customers can be used to plan promotions for such customers [14]; MPSI can be used among the community of medical professionals to find out the patients of a hospital who has participated in the medical tests of different research labs [15]; MPSI can also be used in multi-party access control, where several coowners of a common content each specify a set of users who are permitted to access data. The ones in the intersection are allowed to access the content [16]; MPSI can be employed among several enterprises which have private audit logs of connections to their corporate networks and are interested in identifying similar activities in all networks [17].…”
Section: Introductionmentioning
confidence: 99%
“…To address this issue, in previous work [51] we proposed a privacy-preserving multi-party access control framework, in which users provide their policies in private form and policy evaluation is performed over private inputs. In particular, we designed secure computation protocols for the evaluation of multi-party policies that preserve the confidentiality of the user policies forming the multi-party access control policies.…”
Section: Introductionmentioning
confidence: 99%
“…In particular, we designed secure computation protocols for the evaluation of multi-party policies that preserve the confidentiality of the user policies forming the multi-party access control policies. However, the framework in [51] only allows the evaluation of policies expressed in a simple identity-based access control model and uses a three-valued decision set (permit, deny, and not-applicable) that is not able to capture the complexity of existing access control standards like XACML [44].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The list of common customers can be used to plan promotions for such customers (Cheon et al, 2012); MPSI can be used among the community of medical professionals to find out the patients of a hospital who have participated in the medical tests of different research labs (Cao et al, 2017); MPSI can also be used in multi-party access control, where several co-owners of a common content each specify a set of users who are permitted to access data. The ones in the intersection are allowed to access the content (Sheikhalishahi et al, 2019).…”
Section: Introductionmentioning
confidence: 99%