Design and implementation of a policy-based privacy authorization system

2Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In the Internet era, enterprises want to use personal information of their own or other enterprises' subscribers, and even provide it to other enterprises for their profit. On the other hand, subscribers to Internet enterprises expect their privacy to be securely protected. Therefore, a conflict between enterprises and subscribers can arise in using personal information for the enterprises' benefits. In this paper, we introduce a privacy policy model and propose a policy-based privacy authorization system. The privacy policy model is used for authoring privacy policies and the privacy authorization system renders the authorization decision based on the privacy policies. In the proposed system, policies for enterprises and subscribers are described in XACML, an XML-based OASIS standard language for access control policies. In addition, we show the details of how the procedure of the privacy authorization and conflict resolution is processed in the proposed system. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Choi, H. C., Lee, S. Y., & Lee, H. H. (2006). Design and implementation of a policy-based privacy authorization system. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3975 LNCS, pp. 129–140). Springer Verlag. https://doi.org/10.1007/11760146_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free