• No results found

[PDF] Top 20 Privacy-Aware Risk-Based Access Control Systems

Has 10000 "Privacy-Aware Risk-Based Access Control Systems" found on our website. Below are the top 20 most common "Privacy-Aware Risk-Based Access Control Systems".

Privacy-Aware Risk-Based Access Control Systems

Privacy-Aware Risk-Based Access Control Systems

... Risk-based privacy preserving access control To the best of our knowledge, risk-based ap- proaches to privacy-preserving access control have been ... See full document

192

Risk Aware Hierarchical Attribute Set-Based Encryption (RA-HASBE) Access Control Model

Risk Aware Hierarchical Attribute Set-Based Encryption (RA-HASBE) Access Control Model

... and privacy of the users outsourced valuable data. Several access control models have been proposed for cloud ...dynamic access control ...Encryption based access ... See full document

6

Implementing a privacy-enhanced attribute-based credential system for online social networks with co-ownership management

Implementing a privacy-enhanced attribute-based credential system for online social networks with co-ownership management

... collective privacy decisions about the access control policy to apply which are based on path ...of access control policies, as well as a policy evaluation mechanism which deals ... See full document

25

Access control management and privacy-preserving

Access control management and privacy-preserving

... protect privacy is the W3C’s Platform for Pri- vacy Preferences (P3P) that formally specifies privacy policy by service providers ...user’s privacy preferences ...internal privacy practice of ... See full document

166

Privacy Access for MongoDB

Privacy Access for MongoDB

... and Privacy is the key important for data management ...management systems, which often support data management of web applications, still do not provide ...level based access control ... See full document

6

Vol 7, No 8 (2017)

Vol 7, No 8 (2017)

... data privacy is not only about the data ...an access control. More likely, users want to control the privileges of data manipulation over other users or cloud ...users‟ control in most ... See full document

5

A FAULT-TOLERANT EMERGENCY-AWARE ACCESS CONTROL SCHEME FOR CYBER-PHYSICAL SYSTEMS

A FAULT-TOLERANT EMERGENCY-AWARE ACCESS CONTROL SCHEME FOR CYBER-PHYSICAL SYSTEMS

... Role Based Access Control (RBAC) [17] is one of the most influential schemes for authorized access ...complex access control policies. Different from RBAC, Con- text Based ... See full document

12

TRAAC: Trust and Risk Aware Access Control

TRAAC: Trust and Risk Aware Access Control

... to risk mitigation, a counterpart to risk as- sessment, there exists some work in RAAC [7], [9] that provide sophisticated treatment of risk mitigation actions that are required to be performed by ... See full document

8

Access control scheme to big data using privacy preserving policy

Access control scheme to big data using privacy preserving policy

... the access to a huge amount of big data becomes a very challenging issue, especially when big data are stored in the ...the access policies defined over some attributes of data consumers and only allows ... See full document

8

Access Control Based Privacy Protection Mechanism In Knowledge Extraction

Access Control Based Privacy Protection Mechanism In Knowledge Extraction

... Internet based services and applications are rapidly emerging and increases demand to upgrade applications and existing ...Internet based large storage and services is known as cloud ...specific ... See full document

6

Title: Photo Privacy and Rule Based Access Control for Social Networks

Title: Photo Privacy and Rule Based Access Control for Social Networks

... and systems. The rightness of putting into effect of a way in control design to be copied is based on the statement on which reasoning is based that the way in control design to be ... See full document

6

Privacy enforcement with an extended role-based access control model

Privacy enforcement with an extended role-based access control model

... for privacy-enabled management and exchange of customer data, called the Platform for Enterprise Privacy Practices ...a privacy system: The privacy officer designs and deploys privacy ... See full document

23

Preserving Mobile Data Privacy through Profile Based Access Control

Preserving Mobile Data Privacy through Profile Based Access Control

... Roughly speaking, personal data means any kind of information that can personally identify an individual. The obvious examples are somebody’s name, address, national identification number, date of birth or photographs. ... See full document

6

Purpose based access control for privacy protection in e-healthcare services

Purpose based access control for privacy protection in e-healthcare services

... records, access healthcare information and buy prescription medicines ...improved access, collaboration and data sharing among healthcare providers, patients, and ...provide access to healthcare ... See full document

7

Trust-based model for privacy control in context aware systems

Trust-based model for privacy control in context aware systems

... context-aware systems, there is a high demand on providing privacy solutions to users when they are interacting and exchanging personal ...information. Privacy in this context encompasses ... See full document

6

Privacy Aware using Temporal Role Based Access Control Model

Privacy Aware using Temporal Role Based Access Control Model

... computer, access control is an approach for restricting system access to authorized ...Role based access control is a one way in which the access control is ... See full document

8

Scalable access control for privacy-aware media sharing

Scalable access control for privacy-aware media sharing

... attribute-based access policies, the media stream can be decoded into media content with various levels of quality from multiple ...the access policy will obtain the right access keys to ... See full document

8

Improvement of Privacy and Security in Hybrid Cloud with Attribute Group Based Access Control

Improvement of Privacy and Security in Hybrid Cloud with Attribute Group Based Access Control

... and privacy. Attribute-based Encryption (ABE) is an efficient encryption system with fine-grained access control for encrypting out-sourced data in cloud ...outsourcing systems require ... See full document

6

Access control management and privacy-preserving

Access control management and privacy-preserving

... for privacy preserving access control which is based on a variety of ...purpose-based access control model (CPBAC) is defined and investigated through a practical paradigm ... See full document

15

PRISM: PRIVACY PROTECTION IN SOCIAL NETWORKS USING INTEREST SHARING AND PATTERN MATCHING METHOD

PRISM: PRIVACY PROTECTION IN SOCIAL NETWORKS USING INTEREST SHARING AND PATTERN MATCHING METHOD

... This proposed model provides efficient privacy protection and interest sharing protocol in mobile social networks. Here provided novel attacks scenarios and their efficient solution. Unlike existing approaches, ... See full document

6

Show all 10000 documents...