Personalizing Access Control by Generalizing Access Control

被引:5
|
作者
Barker, Steve [1 ]
机构
[1] Kings Coll London, Dept Comp Sci, London WC2A 2LS, England
关键词
Access Control Models; Integrity; Privacy Policies;
D O I
10.1145/1809842.1809866
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We address the problem of providing data subjects with self-selected controls on access to their personal information. Existing approaches for this are not always sufficient in terms of offering the degrees of control and scope for individualization of access policies that are needed for personal data protection (and usage). We introduce a conceptual framework, a syntax, a semantics, and an axiomatization of a generalized form of access control meta-model, which may be specialized in various ways to enable data subjects to specify flexibly what access controls are to apply on their personal data.
引用
收藏
页码:149 / 158
页数:10
相关论文
共 50 条
  • [21] Database access control
    Urbanovich, Dmitry
    PRZEGLAD ELEKTROTECHNICZNY, 2008, 84 (03): : 150 - 151
  • [22] Access control in BACnet
    Ritter, David
    Isler, Bernhard
    Mundt, Hans-Joachim
    Treado, Stephen
    ASHRAE JOURNAL, 2006, 48 (11) : B28 - B32
  • [23] Access control and watermarking
    2000, European Broadcasting Union
  • [24] Access Control Models
    Penelova, Maria
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2021, 21 (04) : 77 - 104
  • [25] A logic of access control
    Crampton, J
    Loizou, G
    O'Shea, G
    COMPUTER JOURNAL, 2001, 44 (02): : 137 - 149
  • [26] A logic of access control
    Crampton, J
    Loizou, G
    O'Shea, G
    COMPUTER JOURNAL, 2001, 44 (01): : 54 - 66
  • [27] VALUE OF ACCESS CONTROL
    CLARKE, W
    DATA PROCESSING, 1975, 17 (01): : 20 - 21
  • [28] NETWORK ACCESS CONTROL
    Li, Hong-Lok
    COMPUTER, 2010, 43 (12) : 7 - 7
  • [29] Proximity access control
    BPT Security Systems Ltd., United Kingdom
    Build. Eng., 2006, 7 (14-15):
  • [30] Logic in access control
    Abadi, M
    18TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2003, : 228 - 233