Risk-Aware Information Disclosure

被引:9
|
作者
Armando, Alessandro [1 ,2 ]
Bezzi, Michele [4 ]
Metoui, Nadia [2 ,3 ]
Sabetta, Antonino [4 ]
机构
[1] Univ Genoa, DIBRIS, Genoa, Italy
[2] FBK Irst, Secur & Trust Unit, Trento, Italy
[3] Univ Trento, DISI, Trento, Italy
[4] SAP Labs, Prod Secur Res, Sophia Antipolis, France
关键词
ACCESS-CONTROL;
D O I
10.1007/978-3-319-17016-9_17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Risk-aware access control systems grant or deny access to resources based on some notion of risk. In this paper we propose a model that considers the risk of leaking privacy-critical information when querying, e.g., datasets containing personal information. While querying data-bases containing personal information it is current practice to assign all-or-nothing access to avoid the disclosure of sensitive information. Using our model, access-control decisions are based on the disclosure-risk associated with a data access request and, differently from existing models, we include adaptive anonymization operations as risk-mitigation methods. By applying these operations, a request that would otherwise be rejected, is permitted after reducing the risk associated with the returned dataset.
引用
收藏
页码:266 / 276
页数:11
相关论文
共 50 条
  • [31] Decentralized Risk-Aware Tracking of Multiple Targets
    Liu, Jiazhen
    Zhou, Lifeng
    Ramachandran, Ragesh
    Sukhatme, Gaurav S.
    Kumar, Vijay
    DISTRIBUTED AUTONOMOUS ROBOTIC SYSTEMS, DARS 2022, 2024, 28 : 408 - 423
  • [32] Risk-Aware Submodular Optimization for Multirobot Coordination
    Zhou, Lifeng
    Tokekar, Pratap
    IEEE TRANSACTIONS ON ROBOTICS, 2022, 38 (05) : 3064 - 3084
  • [33] A Risk-aware Decision Model for Service Sourcing
    Roedder, Nico
    Karaenke, Paul
    Knapper, Rico
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON SERVICE-ORIENTED COMPUTING AND APPLICATIONS (SOCA), 2013, : 135 - 139
  • [34] A Risk-Aware Modeling Framework for Speech Summarization
    Chen, Berlin
    Lin, Shih-Hsiang
    IEEE TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2012, 20 (01): : 211 - 222
  • [35] Risk-Aware Mitigation for MANET Routing Attacks
    Zhao, Ziming
    Hu, Hongxin
    Ahn, Gail-Joon
    Wu, Ruoyu
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (02) : 250 - 260
  • [36] An online algorithm for the risk-aware restless bandit
    Xu, Jianyu
    Chen, Lujie
    Tang, Ou
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2021, 290 (02) : 622 - 639
  • [37] A Risk-Aware Architecture for Resilient Spacecraft Operations
    McGhan, Catharine L. R.
    Murray, Richard M.
    Serra, Romain
    Ingham, Michel D.
    Ono, Masahiro
    Estlin, Tara
    Williams, Brian C.
    2015 IEEE AEROSPACE CONFERENCE, 2015,
  • [38] Risk-Aware Scheduling throughout Planning and Execution
    Wang, Andrew J.
    PROCEEDINGS OF THE TWENTY-NINTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2015, : 4261 - 4262
  • [39] Risk-Aware Design and Management of Resilient Networks
    Cholda, Piotr
    2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 468 - 475
  • [40] Risk-Aware Model-Based Control
    Yu, Chen
    Rosendo, Andre
    FRONTIERS IN ROBOTICS AND AI, 2021, 8