Personalizing Access Control by Generalizing Access Control

被引:5
|
作者
Barker, Steve [1 ]
机构
[1] Kings Coll London, Dept Comp Sci, London WC2A 2LS, England
关键词
Access Control Models; Integrity; Privacy Policies;
D O I
10.1145/1809842.1809866
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We address the problem of providing data subjects with self-selected controls on access to their personal information. Existing approaches for this are not always sufficient in terms of offering the degrees of control and scope for individualization of access policies that are needed for personal data protection (and usage). We introduce a conceptual framework, a syntax, a semantics, and an axiomatization of a generalized form of access control meta-model, which may be specialized in various ways to enable data subjects to specify flexibly what access controls are to apply on their personal data.
引用
收藏
页码:149 / 158
页数:10
相关论文
共 50 条
  • [1] Personalizing context-aware access control on mobile platforms
    Das, Prajit Kumar
    Joshi, Anupam
    Finin, Tim
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2017, : 107 - 116
  • [2] Function-Based Access Control (FBAC): From Access Control Matrix to Access Control Tensor
    Desmedt, Yvo
    Shaghaghi, Arash
    MIST'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS, 2016, : 89 - 92
  • [3] Access control
    不详
    VETERINARIA ITALIANA, 2020, : 23 - 23
  • [4] Role-Based Access Control and the Access Control Matrix
    Saunders, G.
    Hitchens, M.
    Varadharajan, V.
    2001, Association for Computing Machinery (35):
  • [5] Trust and Risk based Access Control and Access Control Constraints
    Helil, Nurmamat
    Kim, Mucheol
    Han, Sangyong
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (11): : 2254 - 2271
  • [6] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
  • [7] Access Control by Action Control
    Barker, Steve
    SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2008, : 143 - 152
  • [8] Personalizing access to learning networks
    Dolog, Peter
    Simon, Bernd
    Nejdl, Wolfgang
    Klobucar, Tomaz
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2008, 8 (02)
  • [9] ACCESS CONTROL, REVERSE ACCESS CONTROL AND REPLICATION CONTROL IN A WORLD WIDE DISTRIBUTED SYSTEM
    Popescu, Bogdan C.
    Gamage, Chandana
    Tanenbaum, Andrew S.
    IFIP Advances in Information and Communication Technology, 2002, 100 : 155 - 167
  • [10] Access control, reverse access control and replication control in a world wide distributed system
    Popescu, BC
    Gamage, C
    Tanenbaum, AS
    ADVANCED COMMUNICATIONS AND MULTIMEDIA SECURITY, 2002, 100 : 155 - 167