Maintaining Privacy on Derived Objects

Nicola Zannone, Sushil Jajodia, Fabio Massacci, Duminda Wijesekera

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

6 Citations (Scopus)

Abstract

Protecting privacy means to ensure users that access to their personal data complies with their preferences. However, information can be manipulated in order to derive new objects that may disclose part of the original information. Therefore, control of information flow is necessary for guaranteeing privacy protection since users should know and control not only who access their personal data, but also who access information derived from their data. Actually, current approaches for access control do not provide support for managing propagation of information and for representing user preferences. This paper proposes to extend the Flexible Authorization Frame-work (FAF) in order to automatically verify whether a subject is entitled to process personal data and derive the authorizations associated with the outcome of data processing. In order to control information flow, users may specify the range of authorizations that can be associated with objects derived from their data. The frame-work guarantees that every "valid" derived object does not disclose more information than users want and preserves the permissions that users want to maintain. To make the discussion more concrete, we illustrate the proposal with a bank case study.

Original languageEnglish
Title of host publicationProceedings of the 2005 ACM Workshop on Privacy in the Electronic Society
PublisherAssociation for Computing Machinery (ACM)
Pages10-19
Number of pages10
ISBN (Print)1595932283, 9781595932280
Publication statusPublished - 2005
Externally publishedYes
EventWPES 2005: ACM Workshop on Privacy in the Electronic Society - Alexandria, VA, United States
Duration: 7 Nov 20057 Nov 2005

Conference

ConferenceWPES 2005
CountryUnited States
CityAlexandria, VA
Period7/11/057/11/05

Keywords

  • Access control
  • Data protection
  • Information flow

Fingerprint Dive into the research topics of 'Maintaining Privacy on Derived Objects'. Together they form a unique fingerprint.

Cite this