UCT CS Research Document Archive

Self-Protecting Access Control: On Mitigating Privacy Violations with Fault Tolerance

Kayem, Anne V.D.M. , Patrick Martin and Selim G. Akl (2012) Self-Protecting Access Control: On Mitigating Privacy Violations with Fault Tolerance, in Yee, George, Eds. Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards, pages 95-128. IGI Global.

This is the latest version of this eprint.

Full text available as:
PDF - Requires Adobe Acrobat Reader or other PDF viewer.

Abstract

Self-protecting access control mechanisms can be described as an approach to enforcing security in a manner that automatically protects against violations of access control rules. In this chapter, we present a comparative analysis of standard Cryptographic Access Control (CAC) schemes in relation to privacy enforcement on the Web. We postulate that to mitigate privacy violations, self-protecting CAC mechanisms need to be supported by fault-tolerance. As an example of how one might to do this, we present two solutions that are inspired by the autonomic computing paradigm1. Our solutions are centered on how CAC schemes can be extended to protect against privacy violations that might arise from key updates and collusion attacks.

EPrint Type:Book Chapter
Keywords:Self-Protection, Autonomic Computing, Access Control, Cryptographic Key management, Fault Tolerance
Subjects:H Information Systems: H.4 INFORMATION SYSTEMS APPLICATIONS
I Computing Methodologies: I.2 ARTIFICIAL INTELLIGENCE
H Information Systems: H.1 MODELS AND PRINCIPLES
F Theory of Computation: F.2 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY
E Data: E.3 DATA ENCRYPTION
C Computer Systems Organization: C.4 PERFORMANCE OF SYSTEMS
ID Code:827
Deposited By:Kayem, AVDM
Deposited On:09 November 2012

Available Versions of this Item