Abstract
With the convenient connection to network, more and more individual information including sensitive information, such as contact list in Mobile Phone or PDA, can be delegated to the professional third service provider to manage and maintain. However, in this paradigm the critical problems to be resolved are to guarantee both the privacy of delegated individual information and the privacy of authorized users, and what is more important to afford the owners of communication devices to have high level of control and power to create their own particular access control policies. In this paper, we present an approach to implement the personalized access control at third service provider in a privacy preserving way. We illustrate and analysis the security properties of our approach by introducing misuse cases.
| Original language | English |
|---|---|
| Pages (from-to) | 3051-3058 |
| Number of pages | 8 |
| Journal | Journal of Computational Information Systems |
| Volume | 8 |
| Issue number | 7 |
| State | Published - 1 Apr 2012 |
Keywords
- Misuse cases
- Personalized access control
- Privacy preserving