Self-Protecting Access Control: On Mitigating Privacy Violations with Fault Tolerance
Kayem, Anne V.D.M. , Patrick Martin and Selim G. Akl (2011) Self-Protecting Access Control: On Mitigating Privacy Violations with Fault Tolerance, in Yee, George, Eds. Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards. IGI Global.
There is a more recent version of this eprint available. Click here to view it.
Full text available as:
Self-protecting access control mechanisms can be described as an approach to enforcing security in a manner that automatically protects against violations of access control rules. In this chapter, we present a comparative analysis of standard Cryptographic Access Control (CAC) schemes in relation to privacy enforcement on the Web. We postulate that to mitigate privacy violations, self-protecting CAC mechanisms need to be supported by fault-tolerance. As an example of how one might to do this, we present two solutions that are inspired by the autonomic computing paradigm1. Our solutions are centered on how CAC schemes can be extended to protect against privacy violations that might arise from key updates and collusion attacks.
|EPrint Type:||Book Chapter|
|Keywords:||Self-Protection, Autonomic Computing, Access Control, Cryptographic Key management, Fault Tolerance|
|Subjects:||H Information Systems: H.4 INFORMATION SYSTEMS APPLICATIONS|
I Computing Methodologies: I.2 ARTIFICIAL INTELLIGENCE
H Information Systems: H.1 MODELS AND PRINCIPLES
F Theory of Computation: F.2 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY
E Data: E.3 DATA ENCRYPTION
C Computer Systems Organization: C.4 PERFORMANCE OF SYSTEMS
|Deposited By:||Kayem, AVDM|
|Deposited On:||18 November 2011|
Available Versions of this Item
- Self-Protecting Access Control: On Mitigating Privacy Violations with Fault Tolerance (deposited 18 November 2011) [Currently Displayed]