Filters








30 Hits in 3.9 sec

An Algebra for Composing Enterprise Privacy Policies [chapter]

Michael Backes, Markus Dürmuth, Rainer Steinwandt
2004 Lecture Notes in Computer Science  
We base our work on a superset of the syntax and semantics of IBM's Enterprise Privacy Authorization Language (EPAL), which recently has been submitted to W3C for standardization.  ...  We propose an algebra providing various types of operators for composing and restricting enterprise privacy policies like conjunction, disjunction, and scoping, together with its formal semantics.  ...  Semantics of E-P3P Policies An E-P3P request is a tuple (u, d, p, a) which should belong to the set U ×D×P ×A for the given vocabulary.  ... 
doi:10.1007/978-3-540-30108-0_3 fatcat:7jqnupmozrgmzfafqzflxdkpga

Privacy and contextual integrity: framework and applications

A. Barth, A. Datta, J.C. Mitchell, H. Nissenbaum
2006 2006 IEEE Symposium on Security and Privacy (S&P'06)  
Our model is expressive enough to capture naturally many notions of privacy found in legislation, including those found in HIPAA, COPPA, and GLBA.  ...  In comparison with access control and privacy policy frameworks such as RBAC, EPAL, and P3P, these norms focus on who personal information is about, how it is transmitted, and past and future actions by  ...  Previous work on privacy languages, particularly EPAL, used a complex lattice-based definition of entailment. In our model, entailment is captured as standard logical implication.  ... 
doi:10.1109/sp.2006.32 dblp:conf/sp/BarthDMN06 fatcat:jmlno3ootjgtnejtj6zgkpctxi

Bootstrapping Privacy Compliance in Big Data Systems

Shayak Sen, Saikat Guha, Anupam Datta, Sriram K. Rajamani, Janice Tsai, Jeannette M. Wing
2014 2014 IEEE Symposium on Security and Privacy  
With the rapid increase in cloud services collecting and using user data to offer personalized experiences, ensuring that these services comply with their privacy policies has become a business imperative  ...  This work was partially supported by the AFOSR MURI on "Science of Cybersecurity" and the National Science Foundation (NSF) grant CNS1064688 on "Semantics and Enforcement of Privacy Policies: Information  ...  Use and Purpose".  ... 
doi:10.1109/sp.2014.28 dblp:conf/sp/SenGDRTW14 fatcat:2zour3xzdrdblcstjudopr3pzy

Secure knowledge management: confidentiality, trust, and privacy

E. Bertino, L.R. Khan, R. Sandhu, B. Thuraisingham
2006 IEEE transactions on systems, man and cybernetics. Part A. Systems and humans  
Index Terms-Data mining, privacy, role-based access control (RBAC), secure knowledge management, security policy, semantic web, trust negotiation (TN), usage control (UCON).  ...  Therefore, only authorized individuals must be permitted to execute various operations and functions in an organization.  ...  Previously, he has published influential and widely cited papers on various security topics including safety and expressive power of access-control models, lattice-based access controls, and multilevel  ... 
doi:10.1109/tsmca.2006.871796 fatcat:pnqtkbbuazaipeqlo3iz4isdri

On Obligations [chapter]

Manuel Hilty, David Basin, Alexander Pretschner
2005 Lecture Notes in Computer Science  
We provide a formal framework that allows us to precisely specify data protection policies.  ...  An example is the requirement "do not re-distribute data", where the actions of the involved parties may not even be observable.  ...  Viganò provided useful comments on earlier versions of the paper.  ... 
doi:10.1007/11555827_7 fatcat:4spj52pewze25k2fhgrenok6za

Preventive Inference Control in Data-centric Business Models

Rafael Accorsi, Gunter Muller
2013 2013 IEEE Security and Privacy Workshops  
In particular, the study shows that, contrary to our expectations, participants prefer an a-posteriori approach based upon audits to detect whether inferences happened.  ...  Privacy settings and policy languages, such as EPAL, OSL, P3P or XACML, formalize these preferences for processing and enforcement.  ...  [5] model the knowledge of an "inference-savvy" adversary using Bayesian networks. Here, only security levels are considered and not the particular policies of users. Structure.  ... 
doi:10.1109/spw.2013.25 dblp:conf/sp/AccorsiM13 fatcat:5kysro6pxbbabbykcnrqouxuue

A Framework for Expressing and Enforcing Purpose-Based Privacy Policies

Mohammad Jafari, Reihaneh Safavi-Naini, Philip W. L. Fong, Ken Barker
2014 ACM Transactions on Privacy and Security  
Although some models have been proposed for enforcing purpose-based policies, little has been done in dening formal semantics for purpose and therefore an eective enforcement mechanism for policies has  ...  In this paper, we develop a framework for formalizing and enforcing purpose-based privacy policies.  ...  A formal denition of semantics can result in an ecient method for identifying the purpose of access based on the existing artefacts in an information system, and thereby an eective enforcement mechanism  ... 
doi:10.1145/2629689 fatcat:uv6wcsnfx5ddfi2lnqwxvumlxe

L2TAP+SCIP: An Audit-based Privacy Framework Leveraging Linked Data

Reza Samavi, Mariano Consens
2012 Proceedings of the 8th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing  
We include an experimental validation of the scalability of our approach.  ...  SCIP synthesizes contextual integrity concepts and enables query based solutions for two important privacy processes (compliance and obligation derivation).  ...  privacy declarations (e.g., P3P [5] ).  ... 
doi:10.4108/icst.collaboratecom.2012.250607 dblp:conf/colcom/SamaviC12 fatcat:vlis7kjkyfgqho4dey3ik4dmpm

Access Control for Databases: Concepts and Systems

Elisa Bertino
2010 Foundations and Trends in Databases  
In particular, implication rules on objects support the derivation of authorizations from an object to all objects semantically related to it; the semantic relationships are based on the conceptual structures  ...  privacy policies, such as the policies that can be expressed by using the P3P standard [88] .  ... 
doi:10.1561/1900000014 fatcat:trrsnypzyvcq5phpgvee7dumva

Globally reasoning about localised security policies in distributed systems [article]

Alejandro Mario Hernandez
2012 arXiv   pre-print
We identify how this LTS is indeed obtained, and propose an alternative way of model checking the not-yet-induced LTS, by using the system design directly.  ...  Using the Semantics, a Labelled Transition System (LTS) can be induced for every particular system, and over this LTS some model checking tasks could be done.  ...  Interpretation of the Semantics over an LTS As observed in Section 2, the Semantics of the AspectKBL language induces an LTS, and over such a structure it is possible to interpret the ACTLv Semantics from  ... 
arXiv:1205.6465v1 fatcat:57nvs2tm6fgjta2t5ydwhvjvvm

Requirements-based Access Control Analysis and Policy Specification (ReCAPS)

Qingfeng He, Annie I. Antón
2009 Information and Software Technology  
Further validation of the method was performed via an empirical study to evaluate the usefulness and effectiveness of the approach.  ...  Requirements-Based Access Control Analysis and Policy Specification. (Under the direction of Dr. Ana (Annie) I. Antón.)  ...  P3P is an XML-based policy specification language that can be used to specify an organization's privacy practices in a way that can be parsed and used by policy-checking agents on the user's behalf.  ... 
doi:10.1016/j.infsof.2008.11.005 fatcat:6pw6rgmdhzf6vdmd32af57sday

Wireless Sensor Network Security

An Liu, Mihui Kim, Leonardo B. Oliveira, Hailun Tan
2013 International Journal of Distributed Sensor Networks  
The user thereof uses the information at its sole risk and liability. References  ...  The accuracy of data related to the location, time, speed and identity of the user is modelled using lattice structures.  ...  Privacy policy enforcement schemes use modified versions of P3P policies, while adjusting the privacy negotiation protocols to fit the decentralised nature of sensor networks.  ... 
doi:10.1155/2013/362385 fatcat:2ph46uukonbtbdkc5q6t4mvgcq

Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges and Solutions

Pan Jun Sun
2019 IEEE Access  
encryption), CP-ABE (ciphertext policy attribute-based encryption), access structure, revocation mechanism, multiauthority, fine-grained, trace mechanism, proxy re-encryption(PRE), hierarchical encryption  ...  In recent years, there are many research schemes of cloud computing privacy protection based on access control, attribute-based encryption (ABE), trust and reputation, but they are scattered and lack unified  ...  Reference [89] proposed a fuzzy keyword search scheme based on similar semantics of editing distance.  ... 
doi:10.1109/access.2019.2946185 fatcat:tbg5a25f5rd3je4mogemegrvje

Bootstrapping Privacy Compliance in Big Data Systems

Shayak Sen, Saikat Guha, Anupam Datta, Sriram K Rajamani, Janice Y. Tsai, Jeannette M. Wing
2018
With the rapid increase in cloud services collecting and using user data to offer personalized experiences, ensuring that these services comply with their privacy policies has become a business imperative  ...  This work was partially supported by the AFOSR MURI on "Science of Cybersecurity" and the National Science Foundation (NSF) grant CNS1064688 on "Semantics and Enforcement of Privacy Policies: Information  ...  Use and Purpose".  ... 
doi:10.1184/r1/6603935.v1 fatcat:a2jvhal3r5cylp2elb7qlofmga

Modelling and Enforcing Purpose in Privacy Policies [article]

Mohammad Jafari, University Of Calgary, University Of Calgary, Reyhaneh Alsadat Safavi-Naini, Kenneth Edwin Barker
2013
The semantics of this language are defined over an abstract model of business workflows.  ...  We show how purpose constraints can be linked to access control rules to form purpose-based policies and develop an enforcement mechanism in the form of a workflow reference monitor to ensure compliance  ...  A formal denition of semantics paves the way for a clear method of purpose identication and thereby an eective enforcement mechanism for purpose-based policies.  ... 
doi:10.11575/prism/26953 fatcat:yud3i6whbve6ldkxc3sr7u7fc4
« Previous Showing results 1 — 15 out of 30 results