Privacy preserving personalized access control service at third service provider

Research output: Contribution to journalArticlepeer-review

Abstract

With the convenient connection to network, more and more individual information including sensitive information, such as contact list in Mobile Phone or PDA, can be delegated to the professional third service provider to manage and maintain. However, in this paradigm the critical problems to be resolved are to guarantee both the privacy of delegated individual information and the privacy of authorized users, and what is more important to afford the owners of communication devices to have high level of control and power to create their own particular access control policies. In this paper, we present an approach to implement the personalized access control at third service provider in a privacy preserving way. We illustrate and analysis the security properties of our approach by introducing misuse cases.

Original languageEnglish
Pages (from-to)3051-3058
Number of pages8
JournalJournal of Computational Information Systems
Volume8
Issue number7
StatePublished - 1 Apr 2012

Keywords

  • Misuse cases
  • Personalized access control
  • Privacy preserving

Fingerprint

Dive into the research topics of 'Privacy preserving personalized access control service at third service provider'. Together they form a unique fingerprint.

Cite this