Maintaining privacy on derived objects

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Abstract

Protecting privacy means to ensure users that access to their personal data complies with their preferences. However, information can be manipulated in order to derive new objects that may disclose part of the original information. Therefore, control of information flow is necessary for guaranteeing privacy protection since users should know and control not only who access their personal data, but also who access information derived from their data. Actually, current approaches for access control do not provide support for managing propagation of information and for representing user preferences. This paper proposes to extend the Flexible Authorization Frame-work (FAF) in order to automatically verify whether a subject is entitled to process personal data and derive the authorizations associated with the outcome of data processing. In order to control information flow, users may specify the range of authorizations that can be associated with objects derived from their data. The frame-work guarantees that every "valid" derived object does not disclose more information than users want and preserves the permissions that users want to maintain. To make the discussion more concrete, we illustrate the proposal with a bank case study. Copyright 2005 ACM.
Original languageEnglish
Title of host publicationWPES'05: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society
PublisherAssociation for Computing Machinery
Pages10-19
DOIs
Publication statusPublished - 2005
Externally publishedYes
EventWPES'05: 2005 ACM Workshop on Privacy in the Electronic Society - , United States
Duration: 7 Nov 20057 Nov 2005

Publication series

NameWPES'05: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society

Conference

ConferenceWPES'05: 2005 ACM Workshop on Privacy in the Electronic Society
Country/TerritoryUnited States
Period7/11/057/11/05

Fingerprint

Dive into the research topics of 'Maintaining privacy on derived objects'. Together they form a unique fingerprint.

Cite this