期刊文献+

保护用户隐私的访问控制模型 被引量:2

Access Control Model for Privacy Protection
下载PDF
导出
摘要 为解决网络环境中用户的隐私信息保护问题,研究了网络环境中隐私信息保护的特点,从用户的角度出发,提出一个基于用户控制的隐私保护访问控制模型,并通过一个具体实例对该模型的应用过程进行说明.与目前存在的其他保护隐私的模型或方法相比,该模型能在不增加用户负担的情况下,达到更好保护用户隐私的目的,同时不影响现有系统中其他安全保护机制的应用. To protect the privacy of users in a network environment, this paper discusses the main characteristics of privacy protection, proposes a user-centric access control model that allows the user to control access to their private information, and finally illustrates the process of applying the proposedaccess control model through an example. Compared with other models and methods for privacy protection, this model can provide better privacy protection without much additional burden to the users. Additionally, the mechanisms proposed for privacy protection will not adversely affect the usage of other security mechanisms in the same systems and networks.
出处 《北京工业大学学报》 EI CAS CSCD 北大核心 2012年第3期406-409,共4页 Journal of Beijing University of Technology
基金 北京市教育委员会科技发展重点资助项目(KZ200610005008)
关键词 隐私保护 访问控制 网络安全 privacy protection access control network security
  • 相关文献

参考文献9

  • 1XU Fei, HE Jing-sha, WU Xu, et al. A privacy-enhanced access control model [ C ] // Proceedings of 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC 2009. Wuhan: IEEE Computer Society Press, 2009 : 703-706.
  • 2DOYLE C, BAGARIC M. The right to privacy: appealing but flawed [ J ]. International Journal of Human Rights, 2005, 9(1) : 3-36.
  • 3LEINO-KILPI H, VALIMAKI M, DASSEN T, et al. Privacy: a review of the literature [ J ]. International Journal of Nursing Studies, 2001 , 38(6) : 663-671.
  • 4GARG N. Information ethics: privacy and intellectual property [ J ]. IEEE Transactions on Professional Communication, 2006, 49 (2) : 202-203.
  • 5ALLEN A L. Allen's privacy law and society[ M ]. Eagan: Thomson West Publishers, 2007: 50-55.
  • 6WILLIAMS M D. Privacy management, the law and global business strategies : a case for privacy driven design [ C ]// Proceedings of 2009 International Conference on Computational Science and Engineering, AI Magazine CSE 2009. Vancouver: IEEE Computer Society Press, 2009 : 60-67.
  • 7REAY I K, BEATTY P, DICK S, et al. A survey and analysis of the P3P protocol's agents, adoption, maintenance, and future[J]. IEEE Trans Dependable and Secure Computing, 2007, 4(2) : 151-164.
  • 8ANDERSON A H. A comparison of two privacy policy languages: EPAL and XACML [ C ] //Proceedings of the 3rd ACM Workshop on Secure Web Services. Alexandria: ACM, 2006 : 53-60.
  • 9HSIEH G, FOSTER K, EMAMALI G, et al. Using XACML for embedded and fine-grained access control policy[ C] //Proceedings of 2009 International Conference on Availability, Reliability and Security, ARES 2009, CPS. Fukuoka, Japan: IEEE Computer Society Press, 2009 : 462-468.

同被引文献18

  • 1DONG Xiao-xia, LU Ting-jie. Review of the cloud computing and its 'uture development[ J]. Journal of Beijing University of Posts and 1"eleeommunications ,2010,12 (5) :76- 80.
  • 2KIM E, KIMK K, IN H P. A multi-view API impact analysis for open SPL platform [ C ]//Proc of the 12th International Conference on Ad- vanced Communication Technology. Piscataway : IEEE Press, 2010 : 686-691.
  • 3BU Wen-jun, ZOU Chao-bin, YU Jia-lin. Hot cloud computing plat- form recommendations[ J]. Silicon Valley ,2011,5:10-11.
  • 4Di WIMERCATI S D C, FORESTI S, JAJODIA S,et al. Over-en- cryption: management of access control evolution on outsourced data [ C]//Proe of the 33rd International Conference on Very Large Data Bases. [S. 1. ] :ACM Press,2007:123-134.
  • 5ZHOU Miao, MU Yi, SUSILO W, et al. Privacy-preserved access control for cloud computing[ C ]//Proc of the 10th International Con- ference on Trust, Security and Privacy in Computing and Communica- tion. Washington DC : IEEE Computer Society ,2011:83-90.
  • 6GHODSI A, ZAHARIA M, HINDMAN B, et al. Dominant resource fairness : fair allocation of multiple resource types [ C ]//Proc of the 8th USENIX Conference on Networked Systems Design and Implemen- tation. Berkeley : USENIX Association ,2011 : 10- 24.
  • 7Network Working Group. The OAuth 2.0 authorization protocol draft- ieff-oauth-v2- 20 [ EB/OL ]. http://tools, ieff. org/html/draft-ieff- oauth-v2 -20.
  • 8李凤华,王巍,马建峰,梁晓艳.基于行为的访问控制模型及其行为管理[J].电子学报,2008,36(10):1881-1890. 被引量:46
  • 9冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1066
  • 10刘哲理,贾春福,李经纬.保留格式加密模型研究[J].通信学报,2011,32(6):184-190. 被引量:11

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部