IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Leveraging Access Control for Privacy Protection: A Survey

Leveraging Access Control for Privacy Protection: A Survey
View Sample PDF
Author(s): Anna Antonakopoulou (National Technical University of Athens, Greece), Georgios V. Lioudakis (National Technical University of Athens, Greece), Fotios Gogoulos (National Technical University of Athens, Greece), Dimitra I. Kaklamani (National Technical University of Athens, Greece)and Iakovos S. Venieris (National Technical University of Athens, Greece)
Copyright: 2012
Pages: 30
Source title: Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards
Source Author(s)/Editor(s): George O.M. Yee (Aptus Research Solutions Inc. and Carleton University, Canada)
DOI: 10.4018/978-1-61350-501-4.ch003

Purchase

View Leveraging Access Control for Privacy Protection: A Survey on the publisher's website for pricing and purchasing information.

Abstract

Modern business environments amass and exchange a great deal of sensitive information about their employees, customers, products, et cetera, acknowledging privacy to be not only a business but also an ethical and legal requirement. Any privacy violation certainly includes some access to personal information and, intuitively, access control constitutes a fundamental aspect of privacy protection. In that respect, many organizations use security policies to control access to sensitive resources and the employed security models must provide means to handle flexible and dynamic requirements. Consequently, the definition of an expressive privacy-aware access control model constitutes a crucial issue. Among the technologies proposed, there are various access control models incorporating features designed to enforce privacy protection policies, taking mainly into account the purpose of the access, privacy obligations, as well as other contextual constraints, aiming at the accomplishment of the privacy protection requirements. This chapter studies these models, along with the aforementioned features.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom