skip to main content
10.1145/1063979.1063998acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
Article

Purpose based access control of complex data for privacy protection

Published:01 June 2005Publication History

ABSTRACT

As privacy becomes a major concern for both consumers and enterprises, many research efforts have been devoted to the development of privacy protecting technology. We recently proposed a privacy preserving access control model for relational databases,where purpose information associated with a given data element specifies the intended use of the data element. In this paper, we extend our previous work to handle other advanced data managementsystems, such as the ones based on XML and the ones based on the object-relational data model. Another contribution of our paper isthat we address the problem of how to determine the purpose forwhich certain data are accessed by a given user. Our proposedsolution relies on the well-known RBAC model as well as the notionof conditional role which is based on the notions of role attributeand system attribute.

References

  1. Agrawal, Jerry Kiernan, Ramakrishman Srikant, and Yirong Xu.Hippocratic databases.In The 28th International Conference on Very Large Databases (VLDB), 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. David Bell and Leonard LaPadula.Secure computer systems: mathematical foundations and model.Technical report, MITRE Corporation, 1974Google ScholarGoogle Scholar
  3. Jiwon Byun, Elisa Bertino, and Ninghui Li.Purpose-based access control for privacy protection in relational database systems.Technical Report 2004-52, Purdue University, 2004Google ScholarGoogle Scholar
  4. Fang Chen and Ravi Sandhu.Constraints for role-based access control. In the first ACM Workshop on Role-based access control, 1996 Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Federal Trade Commision.Children's online privacy protection act of 1998. Available at www.cdt.org/legislation/105th/privacy/coppa.htmlGoogle ScholarGoogle Scholar
  6. Dorothy Denning, Teresa Lunt, Roger Schell, William Shockley, and Mark Heckman.The seaview security model.In The IEEE Symposium on Research in Security and Privacy, 1998Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Cheh Goh and Adrian Baldwin.Towards a more complete model of role.In The 3rd ACM workshop on Role-based access control, 1998 Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. IBM. The Enterprise Privacy Authorization Language (EPAL).Available at www.zurich.ibm.com/security/enterprise-privacy/epalGoogle ScholarGoogle Scholar
  9. Arun Kumar, Neeran Karnik, and Girish Chafle.Context sensitivity in role-based access control.In ACM SIGOPS Operating Systems Review, July 2002 Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Kristen LeFevre, Rakesh Agrawal, Vuk Ercegovac, Raghu Ramakrishnan,Yirong Xu, and David DeWitt.Disclosure in hippocratic databases.In The 30th International Conference on Very Large Databases (VLDB), August 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. United State Department of Health.Health insurance portability and accountability act of 1996.Available at www.hep-c-alert.org/links/hippa.htmlGoogle ScholarGoogle Scholar
  12. United State Department of Justice.The federal privacy act of 1974.Available at www.usdoj.gov/foia/privstat.htmGoogle ScholarGoogle Scholar
  13. Fausto Rabitti, Elisa Bertino, Won Kim, and Darrell Woelk.A model of authorization for next-generation database systems. In ACM Transactions on Database Systems (TODS), March 1991 Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Ravi Sandhu. Role hierarchies and constraints for lattice-based access control.In the European Symposium on Research in Computer Security, 1996 Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Ravi Sandhu and Fang Chen.The multilevel relational data model. In ACM Transaction on Information and System Security, 1998 Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Ravi Sandhu, David Ferraiolo, and Richard Kuhn.The nist model for role-based access control: Towards a unified standard.In the fifth ACM workshop on Role-based access control, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Ravi Sandhu and Sushil Jajodia.Toward a multilevel secure relational data model.In ACM International Conference on Management of Data (SIGMOD), 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. World Wide Web Consortium (W3C). Platform for Privacy Preferences (P3P). Available at www.w3.org/P3P.Google ScholarGoogle Scholar

Index Terms

  1. Purpose based access control of complex data for privacy protection

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            SACMAT '05: Proceedings of the tenth ACM symposium on Access control models and technologies
            June 2005
            186 pages
            ISBN:1595930450
            DOI:10.1145/1063979
            • General Chair:
            • Elena Ferrari,
            • Program Chair:
            • Gail-Joon Ahn

            Copyright © 2005 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 June 2005

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Acceptance Rates

            Overall Acceptance Rate177of597submissions,30%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader