2013
DOI: 10.1007/978-3-642-38709-8_3
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Privacy-Preserving Execution Model for Data Services

Abstract: Data services have almost become a standard way for data publishing and sharing on top of the Web. In this paper, we present a secure and privacy-preserving execution model for data services. Our model controls the information returned during service execution based on the identity of the data consumer and the purpose of the invocation. We implemented and evaluated the proposed model in the healthcare application domain. The obtained results are promising.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0
1

Year Published

2013
2013
2018
2018

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 17 publications
0
9
0
1
Order By: Relevance
“…We have evaluated our composition-based approach in the healthcare and the bioinformatics domains. The obtained results [5,9,7,14,8,16,6] are promising.…”
Section: Resultsmentioning
confidence: 98%
See 3 more Smart Citations
“…We have evaluated our composition-based approach in the healthcare and the bioinformatics domains. The obtained results [5,9,7,14,8,16,6] are promising.…”
Section: Resultsmentioning
confidence: 98%
“…When a data service is invoked, our model rewrites its corresponding RDF view to take into account applicable security and privacy rules from the service's associated policies, which are expressed using the OrBAC and PrivOrBAC models over domain ontologies and take into account the data recipient (i.e., service consumer), his purpose for requesting the data, and the consents of data subjects [16]. The soundness and correctness of our algorithm are demonstrated in [16,8].…”
Section: Privacy-preserving Service Execution Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…Risk aware information disclosure in [9] can be used for Hadoop Data lake. Secure information access model via data services [11] can be applied for Hadoop data services. HDFS can use data access protection using data distribution and swapping in [16].…”
Section: Related Workmentioning
confidence: 99%