Privacy enforcement through policy extension | Kütüphane.osmanlica.com

Privacy enforcement through policy extension

İsim Privacy enforcement through policy extension
Yazar Arunkumar, S., Srivatsa, M., Soyluoglu, Berker, Şensoy, Murat, Cerutti, F.
Basım Tarihi: 2016
Basım Yeri - IEEE
Konu Context, Standards, Authorization, Process control, Privacy, Information management
Tür Belge
Dil İngilizce
Dijital Evet
Yazma Hayır
Kütüphane: Özyeğin Üniversitesi
Demirbaş Numarası 2155-7578
Kayıt Numarası 77d1de43-c385-458b-9795-6a2b5ebbbdb5
Lokasyon Computer Science
Tarih 2016
Notlar US Army Research laboratory ; the UK Ministry of Defence
Örnek Metin Successful coalition operations require contributions from the coalition partners which might have hidden goals and desiderata in addition to the shared coalition goals. Therefore, there is an inevitable risk-utility trade-off for information producers due to the need-to-know vs. need-to-hide tension, which must take into account the trustworthiness of the other coalition partners. A balance is often achieved by deliberate obfuscation of the shared information. In this paper, we show how to integrate obfuscation capabilities within the current OASIS standard for access control policies, namely XACML.
DOI 10.1109/MILCOM.2016.7795476
Kaynağa git Özyeğin Üniversitesi Özyeğin Üniversitesi
Özyeğin Üniversitesi Özyeğin Üniversitesi
Kaynağa git

Privacy enforcement through policy extension

Yazar Arunkumar, S., Srivatsa, M., Soyluoglu, Berker, Şensoy, Murat, Cerutti, F.
Basım Tarihi 2016
Basım Yeri - IEEE
Konu Context, Standards, Authorization, Process control, Privacy, Information management
Tür Belge
Dil İngilizce
Dijital Evet
Yazma Hayır
Kütüphane Özyeğin Üniversitesi
Demirbaş Numarası 2155-7578
Kayıt Numarası 77d1de43-c385-458b-9795-6a2b5ebbbdb5
Lokasyon Computer Science
Tarih 2016
Notlar US Army Research laboratory ; the UK Ministry of Defence
Örnek Metin Successful coalition operations require contributions from the coalition partners which might have hidden goals and desiderata in addition to the shared coalition goals. Therefore, there is an inevitable risk-utility trade-off for information producers due to the need-to-know vs. need-to-hide tension, which must take into account the trustworthiness of the other coalition partners. A balance is often achieved by deliberate obfuscation of the shared information. In this paper, we show how to integrate obfuscation capabilities within the current OASIS standard for access control policies, namely XACML.
DOI 10.1109/MILCOM.2016.7795476
Özyeğin Üniversitesi
Özyeğin Üniversitesi yönlendiriliyorsunuz...

Lütfen bekleyiniz.