UCT CS Research Document Archive

Self-Protecting Access Control: On Mitigating Privacy Violations with Fault Tolerance

Kayem, Anne V.D.M. , Patrick Martin and Selim G. Akl (2011) Self-Protecting Access Control: On Mitigating Privacy Violations with Fault Tolerance, in Yee, George, Eds. Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards. IGI Global.

There is a more recent version of this eprint available. Click here to view it.

Full text available as:

Abstract

Self-protecting access control mechanisms can be described as an approach to enforcing security in a manner that automatically protects against violations of access control rules. In this chapter, we present a comparative analysis of standard Cryptographic Access Control (CAC) schemes in relation to privacy enforcement on the Web. We postulate that to mitigate privacy violations, self-protecting CAC mechanisms need to be supported by fault-tolerance. As an example of how one might to do this, we present two solutions that are inspired by the autonomic computing paradigm1. Our solutions are centered on how CAC schemes can be extended to protect against privacy violations that might arise from key updates and collusion attacks.

EPrint Type:Book Chapter
Keywords:Self-Protection, Autonomic Computing, Access Control, Cryptographic Key management, Fault Tolerance
Subjects:H Information Systems: H.4 INFORMATION SYSTEMS APPLICATIONS
I Computing Methodologies: I.2 ARTIFICIAL INTELLIGENCE
H Information Systems: H.1 MODELS AND PRINCIPLES
F Theory of Computation: F.2 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY
E Data: E.3 DATA ENCRYPTION
C Computer Systems Organization: C.4 PERFORMANCE OF SYSTEMS
ID Code:732
Deposited By:Kayem, AVDM
Deposited On:18 November 2011

Available Versions of this Item