Accorsi, 2008 - Google Patents
Automated privacy audits to complement the notion of control for identity managementAccorsi, 2008
View PDF- Document ID
- 13362451927668512241
- Author
- Accorsi R
- Publication year
- Publication venue
- Policies and Research in Identity Management: First IFIP WG11. 6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007
External Links
Snippet
Identity management systems are indispensable in modern networked computing, as they equip data providers with key techniques to avoid the imminent privacy threats intrinsic to such environments. Their rationale is to convey data providers with a sense of control over …
- 230000000295 complement 0 title description 7
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6281—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shahriar et al. | A survey of privacy risks and mitigation strategies in the artificial intelligence life cycle | |
Fang et al. | A survey of big data security and privacy preserving | |
Cavoukian et al. | Privacy by design in the age of big data | |
US11461785B2 (en) | System and method to identify, classify and monetize information as an intangible asset and a production model based thereon | |
Shen et al. | Privacy enhancing technologies: A review | |
Accorsi | Automated privacy audits to complement the notion of control for identity management | |
Wu et al. | A comprehensive study to the protection of digital library readers' privacy under an untrusted network environment | |
Bonchi et al. | Privacy-aware knowledge discovery: novel applications and new techniques | |
Weigl et al. | Mediating the tension between data sharing and privacy: The case of DMA and GDPR | |
CN119652551A (en) | A user information management method and system based on application information | |
Francined Herrera-Cubides et al. | Security aspects in web of data based on trust principles. A brief of literature review | |
Ghesmati et al. | Studying bitcoin privacy attacks and their impact on bitcoin-based identity methods | |
Martovytskyi et al. | DEVISING AN APPROACH TO THE IDENTIFICATION OF SYSTEM USERS BY THEIR BEHAVIOR USING MACHINE LEARNING METHODS. | |
CN119442290A (en) | Data isolation and privacy protection method and system for large data security models | |
Fehér et al. | Log file authentication and storage on blockchain network | |
Li et al. | Data Privacy Enhancing in the IoT User/Device Behavior Analytics | |
Canfora et al. | A three-layered model to implement data privacy policies | |
CN115115351A (en) | Method and system for auditing environmental damage identification evaluation report | |
Padget et al. | Fine-grained access control via policy-carrying data | |
Kareem et al. | Development of a Decentralized Personal Indefinable Information (PII) Management Systems Using Blockchain dBFT Consensus Algorithm | |
Dejanovic et al. | Using blockchain to decentralize and protect user privacy in compliance with GDPR | |
Rath et al. | Towards building data trust and transparency in data-driven business applications | |
JP3890367B1 (en) | Management system and management program | |
CN117951174B (en) | A data classification and grading method, device, equipment and medium based on data set | |
Delgado et al. | Using open source for forensic purposes |