Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2752952.2752980acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
panel

Privacy and Access Control: How are These Two concepts Related?

Published: 01 June 2015 Publication History

Abstract

No abstract available.

References

[1]
A. Blum, K. Ligett, and A. Roth. A learning theory approach to noninteractive database privacy. Journal of the ACM (JACM), 60(2):12, 2013.
[2]
J.-W. Byun, E. Bertino, and N. Li. Purpose based access control of complex data for privacy protection. In Proceedings of the tenth ACM symposium on Access control models and technologies, pages 102--110. ACM, 2005.
[3]
J. Camenisch, S. Mödersheim, G. Neven, F.-S. Preiss, and D. Sommer. A language enabling privacy-preserving access control. SACMAT, 2010.
[4]
D. W. Chadwick and K. Fatema. A privacy preserving authorisation system for the cloud. Journal of Computer and System Sciences, 78(5):1359--1373, 2012.
[5]
C. Dwork. Differential privacy: A survey of results. In Theory and Applications of Models of Computation, pages 1--19. Springer, 2008.
[6]
M. J. May, C. A. Gunter, and I. Lee. Privacy apis: Access control techniques to analyze and verify legal privacy policies. In Computer Security Foundations Workshop, 2006. 19th IEEE, pages 13--pp. IEEE, 2006.
[7]
H. J. Smith, T. Dinev, and H. Xu. Information privacy research: an interdisciplinary review. MIS quarterly, 35(4):989--1016, 2011.

Index Terms

  1. Privacy and Access Control: How are These Two concepts Related?

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SACMAT '15: Proceedings of the 20th ACM Symposium on Access Control Models and Technologies
    June 2015
    242 pages
    ISBN:9781450335560
    DOI:10.1145/2752952
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 June 2015

    Check for updates

    Author Tags

    1. access control
    2. privacy
    3. security

    Qualifiers

    • Panel

    Conference

    SACMAT '15
    Sponsor:

    Acceptance Rates

    SACMAT '15 Paper Acceptance Rate 17 of 59 submissions, 29%;
    Overall Acceptance Rate 177 of 597 submissions, 30%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 263
      Total Downloads
    • Downloads (Last 12 months)4
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 09 Nov 2024

    Other Metrics

    Citations

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media