14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings.
DOI: 10.1109/dexa.2003.1232051
|View full text |Cite
|
Sign up to set email alerts
|

Towards accountable management of identity and privacy: sticky policies and enforceable tracing services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
81
0
1

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 139 publications
(85 citation statements)
references
References 6 publications
0
81
0
1
Order By: Relevance
“…While some work has addressed the other requirements identified by Gates, such as relationship-based requirements and interoperability issues, to the best of our knowledge no other work has ever proposed a solution along this line. One of the most well-known works dealing with sticky-policy [17] is geared toward business domains, and it does not apply to online SN data. Hence, the solution from Casassa-Mont is very different from our work, in that it relies on strong requirements for the underlying software and hardware architecture.…”
Section: Related Workmentioning
confidence: 99%
“…While some work has addressed the other requirements identified by Gates, such as relationship-based requirements and interoperability issues, to the best of our knowledge no other work has ever proposed a solution along this line. One of the most well-known works dealing with sticky-policy [17] is geared toward business domains, and it does not apply to online SN data. Hence, the solution from Casassa-Mont is very different from our work, in that it relies on strong requirements for the underlying software and hardware architecture.…”
Section: Related Workmentioning
confidence: 99%
“…Their work has focused on protecting digital content from unauthorized copying and distribution by disseminating packages containing the content data and access control policies. Several efforts [6,7] toward managing privacy have introduced the concept of "sticky policies", in which handling policies are directly associated with personal information. In their approaches, users retain control over their personal information even after it has been disclosed by enforcing its privacy policies, which reflect their preferences about how it is to be used next at its recipient site.…”
Section: Related Workmentioning
confidence: 99%
“…Casassa Mont introduced the use of sticky policies and of Identity Based Encryption (IBE) [7] [19] to transform policies into encryption keys and bind them to the encrypted data [17]. Decryption keys can then be issued only by a specific TA, chosen at encryption time, if the policies are satisfied.…”
Section: Related Workmentioning
confidence: 99%
“…A trusted component running on the recipient devices that we will refer to as the virtual machine (VM), ensures that rights are locally enforced. Specific architectures differ in their management of user authentication, policy and rights retrieval, audit of user actions and other tasks [4,16,17,18,23].…”
Section: Introductionmentioning
confidence: 99%