Kabir, Md Enamul and Wang, Hua (2009) Conditional purpose based access control model for privacy protection. In: ADC 2009: 20th Australasian Conference on Australasian Database, 20-23 Jan 2009, Wellington, New Zealand.
|HTML Citation||EndNote||Dublin Core||Reference Manager|
Full text not available from this archive.
Official URL: http://www.cse.unsw.edu.au/~adc09/
Identification Number or DOI: 978-1-920682-73-6
This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited purpose in the model. It allows users using some data for certain purpose with conditions. The structure of conditional purpose based access control model is defined and investigated through a practical paradigm with access purpose and intended purpose. An algorithm is developed to achieve the compliance computation between access purposes and intended purposes. According to this model, more information from data providers can be extracted while at the same time assuring privacy that maximizes the usability of consumers' data. This model extends traditional access control models to a further coverage of privacy preserving in data mining atmosphere. Its interior is a new structure for managing collected data in an effective and trustworthy way. This structure helps enterprises to circulate clear privacy promise, to collect and manage user preferences and consent. The implementation of the idea in the paper shows the flexibility of the model, and finally we provide comparisons of our work to other related work.
|Item Type:||Conference or Workshop Item (Commonwealth Reporting Category E) (Paper)|
|Additional Information:||Deposited in accordance with the copyright policy of the publsiher. Copyright 2009, Australian Computer Society, Inc. This paper appeared at the 20th Australasian Database Conference (ADC 2009), Wellington, New Zealand. Conferences in Research and Practice in Information Technology (CRPIT), Vol. 92, Athman Bouguettaya and Xuemin Lin, Ed. Reproduction for academic, not-for profit purposes permitted provided this text is included.|
|Uncontrolled Keywords:||access control; access purpose; intended purpose; conditional intended purpose; prohibited intended purpose; security; protection; privacy|
|Fields of Research (FOR2008):||08 Information and Computing Sciences > 0806 Information Systems > 080603 Conceptual Modelling|
08 Information and Computing Sciences > 0801 Artificial Intelligence and Image Processing > 080109 Pattern Recognition and Data Mining
08 Information and Computing Sciences > 0803 Computer Software > 080303 Computer System Security
|Subjects:||280000 Information, Computing and Communication Sciences > 280500 Data Format > 280505 Data Security|
|Socio-Economic Objective (SEO2008):||B Ecomonic Development > 89 Information and Communication Services > 8999 Other Information and Communication Services > 899999 Information and Communication Services not elsewhere classified|
|Deposited On:||28 Mar 2010 21:13|
|Last Modified:||21 Dec 2011 15:13|
Archive Staff Only: edit this record