Self-Protecting Access Control: On Mitigating Privacy Violations with Fault Tolerance

Kayem, Anne V.D.M. and Martin, Patrick and Akl, Selim G. (2011) Self-Protecting Access Control: On Mitigating Privacy Violations with Fault Tolerance, Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards, IGI Global.

WarningThere is a more recent version of this item available.
Full text not available from this repository. (Use alternate locations listed below)


Self-protecting access control mechanisms can be described as an approach to enforcing security in a manner that automatically protects against violations of access control rules. In this chapter, we present a comparative analysis of standard Cryptographic Access Control (CAC) schemes in relation to privacy enforcement on the Web. We postulate that to mitigate privacy violations, self-protecting CAC mechanisms need to be supported by fault-tolerance. As an example of how one might to do this, we present two solutions that are inspired by the autonomic computing paradigm1. Our solutions are centered on how CAC schemes can be extended to protect against privacy violations that might arise from key updates and collusion attacks.

Item Type: Book chapter
Uncontrolled Keywords: Self-Protection, Autonomic Computing, Access Control, Cryptographic Key management, Fault Tolerance
Subjects: Information systems > Information systems applications
Computing methodologies > Artificial intelligence
Information systems
Theory of computation > Design and analysis of algorithms
Information systems > Data management systems > Data structures > Data layout > Data encryption
Computer systems organization > Dependable and fault-tolerant systems and networks
Date Deposited: 18 Nov 2011
Last Modified: 10 Oct 2019 15:33

Available Versions of this Item

Actions (login required)

View Item View Item