Formalizing and enforcing purpose restrictions in privacy policies
Privacy policies often place restrictions on the purposes for which a governed entity may use
personal information. For example, regulations, such as the Health Insurance Portability and …
personal information. For example, regulations, such as the Health Insurance Portability and …
Towards defining semantic foundations for purpose-based privacy policies
We define a semantic model for purpose, based on which purpose-based privacy policies
can be meaningfully expressed and enforced in a business system. The model is based on …
can be meaningfully expressed and enforced in a business system. The model is based on …
A declarative framework for specifying and enforcing purpose-aware policies
Purpose is crucial for privacy protection as it makes users confident that their personal data
are processed as intended. Available proposals for the specification and enforcement of …
are processed as intended. Available proposals for the specification and enforcement of …
A framework for expressing and enforcing purpose-based privacy policies
Purpose is a key concept in privacy policies. Although some models have been proposed for
enforcing purpose-based privacy policies, little has been done in defining formal semantics …
enforcing purpose-based privacy policies, little has been done in defining formal semantics …
Purpose restrictions on information use
Privacy policies in sectors as diverse as Web services, finance and healthcare often place
restrictions on the purposes for which a governed entity may use personal information. Thus …
restrictions on the purposes for which a governed entity may use personal information. Thus …
Delegation of access rights in a privacy preserving access control model
M Moniruzzaman, K Barker - 2011 Ninth Annual International …, 2011 - ieeexplore.ieee.org
Delegation is a process of sharing access rights by users of an access control model. It
facilitates the distribution of authorities in the model. It is also useful in collaborative …
facilitates the distribution of authorities in the model. It is also useful in collaborative …
OrBAC from access control model to access usage model
The purpose based access control model has been proposed recently to restrict the access
to the sensitive data which are out of control of their owner. This model can be enforced by …
to the sensitive data which are out of control of their owner. This model can be enforced by …
Privacy-Preserving Data Management using Blockchains
MM Kwakye - arXiv preprint arXiv:2408.11263, 2024 - arxiv.org
Privacy-preservation policies are guidelines formulated to protect data providers private
data. Previous privacy-preservation methodologies have addressed privacy in which data …
data. Previous privacy-preservation methodologies have addressed privacy in which data …
A study of privacy policy enforcement in access control models
M Moniruzzaman, MS Ferdous… - 2010 13th International …, 2010 - ieeexplore.ieee.org
Internet has gained huge popularity over the last decade. It offers its users reliable, efficient
and exciting online services. However, the users reveal a lot of their personal information by …
and exciting online services. However, the users reveal a lot of their personal information by …
A data-centric approach for privacy-aware business process enablement
S Short, SP Kaluvuri - … : Third International IFIP Working Conference, IWEI …, 2011 - Springer
In a SOA context, enterprises can use workflow technologies to orchestrate available
business processes and their corresponding services and apply business rules or policies to …
business processes and their corresponding services and apply business rules or policies to …