Fourth Annual ACIS International Conference on Computer and Information Science (ICIS'05) 2005
DOI: 10.1109/icis.2005.103
|View full text |Cite
|
Sign up to set email alerts
|

PRBAC: an extended role based access control for privacy preserving data mining

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…A major concern in RFID-based healthcare systems is how user privacy can be protected when using RFID identification data. In this regard, Rahman et al (2017) suggested a healthcare service access control framework where unauthorized disclosures of health information need to be prevented by using access control techniques (Dafa-Alla, Kim, Ryu, & Heo, 2005). As shown in Fig.…”
Section: Internet Of Things Authenticationmentioning
confidence: 99%
“…A major concern in RFID-based healthcare systems is how user privacy can be protected when using RFID identification data. In this regard, Rahman et al (2017) suggested a healthcare service access control framework where unauthorized disclosures of health information need to be prevented by using access control techniques (Dafa-Alla, Kim, Ryu, & Heo, 2005). As shown in Fig.…”
Section: Internet Of Things Authenticationmentioning
confidence: 99%
“…The HSAC component of the PriSens-HSAC framework uses P-RBAC [17] as part of the HSAC component. There are plenty of role based access control techniques in the literature.…”
Section: Related Workmentioning
confidence: 99%
“…If any unauthorized user wants to access any healthcare service (ex. access patient's medical history using the ID of the tag), HSAC will not allow the user to access that service using a privacy aware role based access control mechanism [17] . Therefore, it is evident that PriSens component will run in tags and reader.…”
Section: Architecture Of Prisens-hsac Frameworkmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently published access control schemes have various characteristics for providing flexibility and security. Generalized temporal role-based access control (GTRBAC) can give access rights under the time constraints and the periodical configuration [25, 26], Privacy role-based access control (PRABAC) can provide stronger privacy policy to the access time [27, 28]. And Geo-RBAC model is considering the user location information before giving the access permission [29].…”
Section: Related Workmentioning
confidence: 99%