[go: up one dir, main page]

Accorsi, 2008 - Google Patents

Automated privacy audits to complement the notion of control for identity management

Accorsi, 2008

View PDF
Document ID
13362451927668512241
Author
Accorsi R
Publication year
Publication venue
Policies and Research in Identity Management: First IFIP WG11. 6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007

External Links

Snippet

Identity management systems are indispensable in modern networked computing, as they equip data providers with key techniques to avoid the imminent privacy threats intrinsic to such environments. Their rationale is to convey data providers with a sense of control over …
Continue reading at opendl.ifip-tc6.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6281Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Similar Documents

Publication Publication Date Title
Shahriar et al. A survey of privacy risks and mitigation strategies in the artificial intelligence life cycle
Fang et al. A survey of big data security and privacy preserving
Cavoukian et al. Privacy by design in the age of big data
US11461785B2 (en) System and method to identify, classify and monetize information as an intangible asset and a production model based thereon
Shen et al. Privacy enhancing technologies: A review
Accorsi Automated privacy audits to complement the notion of control for identity management
Wu et al. A comprehensive study to the protection of digital library readers' privacy under an untrusted network environment
Bonchi et al. Privacy-aware knowledge discovery: novel applications and new techniques
Weigl et al. Mediating the tension between data sharing and privacy: The case of DMA and GDPR
CN119652551A (en) A user information management method and system based on application information
Francined Herrera-Cubides et al. Security aspects in web of data based on trust principles. A brief of literature review
Ghesmati et al. Studying bitcoin privacy attacks and their impact on bitcoin-based identity methods
Martovytskyi et al. DEVISING AN APPROACH TO THE IDENTIFICATION OF SYSTEM USERS BY THEIR BEHAVIOR USING MACHINE LEARNING METHODS.
CN119442290A (en) Data isolation and privacy protection method and system for large data security models
Fehér et al. Log file authentication and storage on blockchain network
Li et al. Data Privacy Enhancing in the IoT User/Device Behavior Analytics
Canfora et al. A three-layered model to implement data privacy policies
CN115115351A (en) Method and system for auditing environmental damage identification evaluation report
Padget et al. Fine-grained access control via policy-carrying data
Kareem et al. Development of a Decentralized Personal Indefinable Information (PII) Management Systems Using Blockchain dBFT Consensus Algorithm
Dejanovic et al. Using blockchain to decentralize and protect user privacy in compliance with GDPR
Rath et al. Towards building data trust and transparency in data-driven business applications
JP3890367B1 (en) Management system and management program
CN117951174B (en) A data classification and grading method, device, equipment and medium based on data set
Delgado et al. Using open source for forensic purposes