2015
DOI: 10.4018/ijsse.2015040104
|View full text |Cite
|
Sign up to set email alerts
|

Risk-Based Privacy-Aware Information Disclosure

Abstract: Risk-aware access control systems grant or deny access to resources based on the notion of risk. It has many advantages compared to classical approaches, allowing for more flexibility, and ultimately supporting for a better exploitation of data. The authors propose and demonstrate a risk-aware access control framework for information disclosure, which supports run-time risk assessment. In their framework access-control decisions are based on the disclosure-risk associated with a data access request and, differ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 22 publications
(43 reference statements)
0
6
0
Order By: Relevance
“…We performed a simulation of the attacks computing the privacy risk values for all individuals in the dataset and for all B k . 3 We then show the distribution of the mobility features presented in Sect. 2 at varying levels of risk: we compare the distribution of the features computed on the original dataset, i.e., the dataset with the complete set of trajectories, with the distributions obtained using only trajectories belonging to individuals below certain thresholds of privacy risk.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…We performed a simulation of the attacks computing the privacy risk values for all individuals in the dataset and for all B k . 3 We then show the distribution of the mobility features presented in Sect. 2 at varying levels of risk: we compare the distribution of the features computed on the original dataset, i.e., the dataset with the complete set of trajectories, with the distributions obtained using only trajectories belonging to individuals below certain thresholds of privacy risk.…”
Section: Methodsmentioning
confidence: 99%
“…The unicity measure proposed in [20] evaluates the privacy risk as the number of records which are uniquely identified. [3] proposes a risk-aware framework for information disclosure in tabular data supporting runtime risk assessment, using adaptive anonymization as risk-mitigation method. Lastly, in [15] authors introduced a privacy risk assessment framework specific for mobility data.…”
Section: Related Workmentioning
confidence: 99%
“…An interesting example is the article by Armando et al, which describes a risk‐aware access control framework for information disclosure. The presented prototype includes a risk mitigation module which uses adaptive anonymization operations implemented on top of ARX . Another example is the work by Jiang et al, in which game‐theoretic methods have been used to develop a credibility model in cooperative networks and ARX has been included in the evaluation .…”
Section: Summary and Practical Experiencesmentioning
confidence: 99%
“…Risk aware information disclosure in [9] can be used for Hadoop Data lake. Secure information access model via data services [11] can be applied for Hadoop data services.…”
Section: Related Workmentioning
confidence: 99%