Privacy is linking permission to purpose

F. Massacci, N. Zannone

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Abstract

The last years have seen a peak in privacy related research. The focus has been mostly on how to protect the individual from being tracked, with plenty of anonymizing solutions. We advocate another model that is closer to the "physical" world: we consider our privacy respected when our personal data is used for the purpose for which we gave it in the first place. Essentially, in any distributed authorization protocol, credentials should mention their purpose beside their powers. For this information to be meaningful we should link it to the functional requirements of the original application. We sketch how one can modify a requirement engineering methodology to incorporate security concerns so that we explicitly trace back the high-level goals for which a functionality has been delegated by a (human or software) agent to another one. Then one could be directly derive purpose-based trust management solutions from the requirements. © Springer-Verlag Berlin Heidelberg 2006.
Original languageEnglish
Title of host publicationSecurity Protocols - 12th International Workshop, Revised Selected Papers
PublisherSpringer Verlag
Pages179-198
DOIs
Publication statusPublished - 2006
Externally publishedYes
EventSecurity Protocols - 12th International Workshop, Revised Selected Papers - , United Kingdom
Duration: 26 Apr 200428 Apr 2004

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceSecurity Protocols - 12th International Workshop, Revised Selected Papers
Country/TerritoryUnited Kingdom
Period26/04/0428/04/04

Fingerprint

Dive into the research topics of 'Privacy is linking permission to purpose'. Together they form a unique fingerprint.

Cite this