Kayem, Anne V.D.M. and Martin, Patrick and Akl, Selim G. (2011) Self-Protecting Access Control: On Mitigating Privacy Violations with Fault Tolerance, Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards, IGI Global.
There is a more recent version of this item available. |
Abstract
Self-protecting access control mechanisms can be described as an approach to enforcing security in a manner that automatically protects against violations of access control rules. In this chapter, we present a comparative analysis of standard Cryptographic Access Control (CAC) schemes in relation to privacy enforcement on the Web. We postulate that to mitigate privacy violations, self-protecting CAC mechanisms need to be supported by fault-tolerance. As an example of how one might to do this, we present two solutions that are inspired by the autonomic computing paradigm1. Our solutions are centered on how CAC schemes can be extended to protect against privacy violations that might arise from key updates and collusion attacks.
Item Type: | Book chapter |
---|---|
Uncontrolled Keywords: | Self-Protection, Autonomic Computing, Access Control, Cryptographic Key management, Fault Tolerance |
Subjects: | Information systems > Information systems applications Computing methodologies > Artificial intelligence Information systems Theory of computation > Design and analysis of algorithms Information systems > Data management systems > Data structures > Data layout > Data encryption Computer systems organization > Dependable and fault-tolerant systems and networks |
Date Deposited: | 18 Nov 2011 |
Last Modified: | 10 Oct 2019 15:33 |
URI: | http://pubs.cs.uct.ac.za/id/eprint/732 |
Available Versions of this Item
- Self-Protecting Access Control: On Mitigating Privacy Violations with Fault Tolerance. (deposited 18 Nov 2011) [Currently Displayed]
Actions (login required)
View Item |