Proceedings of the 12th ACM Symposium on Access Control Models and Technologies 2007
DOI: 10.1145/1266840.1266848
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-aware role based access control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
59
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 137 publications
(68 citation statements)
references
References 10 publications
0
59
0
Order By: Relevance
“…Most prior work on using formal methods for enforcing purpose restrictions has focused on when observable actions achieve a purpose [17][18][19][20][21][22][23][24]. That is, they define an action as being for a purpose if that action (possibly as part of a chain of actions) results in that purpose being achieved.…”
Section: Prior Workmentioning
confidence: 99%
“…Most prior work on using formal methods for enforcing purpose restrictions has focused on when observable actions achieve a purpose [17][18][19][20][21][22][23][24]. That is, they define an action as being for a purpose if that action (possibly as part of a chain of actions) results in that purpose being achieved.…”
Section: Prior Workmentioning
confidence: 99%
“…Also, a relevant work in [19] proposes a comprehensive framework for expressing highly complex privacy-related policies, featuring purposes and obligations. Also, a formal definition of conflicting permission assignments is given, together with efficient conflict-checking algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…For the current popular use of Role Based Access Control (RBAC) model [13] in assigning access level to users, we may consider that it is very much possible to extend the model so that it recognizes or supports privacy protection by evaluating the users' purposes, conditions and obligations when using a database. Most of the database organizations have integrated RBAC model into their database management systems, and the privacy-aware models framed by enhancing RBAC model can be usefully implemented into these systems [14].…”
Section: Fig 2 System Flow Diagram Of Role Based Access Control Modementioning
confidence: 99%