Trust, purpose, and role-based access control model for privacy protection
Data privacy is one of the fundamental needs of the people. In a computing environment, there are various issues of data privacy protection in the enterprise. To enforce the automation of privacy policies and law, access control has been one of the most devoted subjects. Role-based access control mo...
| Main Authors: | Salji, Mohd Rafiz, Udzir, Nur Izura, Ninggal, Mohd Izuan Hafez, Mohd Sani, Nor Fazlida, Ibrahim, Hamidah |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
Database Technologies and Applications Research Group (DbTA), Faculty of Computer Science and Information Technology, Universiti Putra Malaysia
2019
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/75526/ http://psasir.upm.edu.my/id/eprint/75526/1/ISICTMA2019-14.pdf |
Similar Items
Performance and divisional trust and purpose-based access control for privacy preservation
by: Salji, Mohd Rafiz, et al.
Published: (2018)
by: Salji, Mohd Rafiz, et al.
Published: (2018)
Role performance trust-based access control for protecting sensitive attributes
by: Salji, Mohd Rafiz, et al.
Published: (2016)
by: Salji, Mohd Rafiz, et al.
Published: (2016)
Access control model based on trust, purpose, and role in materialized view for privacy protection
by: Salji, Mohd Rafiz
Published: (2019)
by: Salji, Mohd Rafiz
Published: (2019)
Trust-based access control model with quantification method for protecting sensitive attributes
by: Salji, Mohd Rafiz, et al.
Published: (2022)
by: Salji, Mohd Rafiz, et al.
Published: (2022)
An autonomous role and consideration of electronic health systems with access control in developed countries: a review
by: Salji, Mohd Rafiz, et al.
Published: (2023)
by: Salji, Mohd Rafiz, et al.
Published: (2023)
Smart-contract privacy preservation mechanism
by: Siraj, Muhammed, et al.
Published: (2023)
by: Siraj, Muhammed, et al.
Published: (2023)
Blockchain-based access control scheme for secure shared personal health records over decentralised storage
by: Hussien, Hassan Mansur, et al.
Published: (2021)
by: Hussien, Hassan Mansur, et al.
Published: (2021)
Privacy preserving social network data publication
by: Abawajy, Jemal H., et al.
Published: (2016)
by: Abawajy, Jemal H., et al.
Published: (2016)
Privacy concern on social network sites: the role of protection motivation, trust and risk
by: Salleh, Norsaremah, et al.
Published: (2012)
by: Salleh, Norsaremah, et al.
Published: (2012)
Security extensible access control markup language policy integration based on role-based access control model in healthcare collaborative environments
by: Teo, Poh Kuang, et al.
Published: (2011)
by: Teo, Poh Kuang, et al.
Published: (2011)
A survey on privacy impacts of digital investigation
by: Daryabar, Farid, et al.
Published: (2013)
by: Daryabar, Farid, et al.
Published: (2013)
Privacy threat analysis of mobile social network data publishing
by: Abawajy, Jemal H., et al.
Published: (2018)
by: Abawajy, Jemal H., et al.
Published: (2018)
Shield privacy: A conceptual framework for information privacy and data access controls
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Non charitable purpose trusts
by: Hamzah, Hamimah
Published: (2011)
by: Hamzah, Hamimah
Published: (2011)
Privacy levels for computer forensics: toward a more efficient
privacy-preserving investigation
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
An efficient secure and energy resilient trust-based system for detection and mitigation of sybil attack detection (SAN)
by: Hussain, Muhammad Zunnurain, et al.
Published: (2024)
by: Hussain, Muhammad Zunnurain, et al.
Published: (2024)
An empirical study of the characteristics of access control model towards secure KMS in collaborative environment
by: Abu Bakar, Azreena, et al.
Published: (2011)
by: Abu Bakar, Azreena, et al.
Published: (2011)
Blockchain technology in the healthcare industry: trends and opportunities
by: Hussien, Hassan Mansur, et al.
Published: (2021)
by: Hussien, Hassan Mansur, et al.
Published: (2021)
Access control in open distributed systems
by: Udzir, Nur Izura, et al.
Published: (2012)
by: Udzir, Nur Izura, et al.
Published: (2012)
Breaking the Privacy Kill Chain: Protecting Individual and Group Privacy Online
by: Kim, J., et al.
Published: (2018)
by: Kim, J., et al.
Published: (2018)
Scalable workflow scheduling algorithm for minimizing makespan and failure probability
by: Abdul Aziz, Maslina, et al.
Published: (2019)
by: Abdul Aziz, Maslina, et al.
Published: (2019)
A XML based, user-centered privacy model in pervasive
computing systems
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
A secure and privacy preserving iris biometric authentication scheme with matrix transformation
by: Udzir, Nur Izura, et al.
Published: (2017)
by: Udzir, Nur Izura, et al.
Published: (2017)
Analysis of access control model for data security and privacy on multi-tenant SaaS
by: Duraisamy, Gunavathi, et al.
Published: (2018)
by: Duraisamy, Gunavathi, et al.
Published: (2018)
Towards privacy protection in smart grid
by: Zeadally, Sherali, et al.
Published: (2012)
by: Zeadally, Sherali, et al.
Published: (2012)
Comprehensive survey on Big Data Privacy
Protection
by: BinJubeir, Mohammed, et al.
Published: (2019)
by: BinJubeir, Mohammed, et al.
Published: (2019)
Privacy and trust in the Islamic perspective: implication of the digital age
by: Lubis, Muharman, et al.
Published: (2013)
by: Lubis, Muharman, et al.
Published: (2013)
A compact bit string accessibility map for secure XML query processing
by: Mirabi, Meghdad, et al.
Published: (2012)
by: Mirabi, Meghdad, et al.
Published: (2012)
Privacy and the Access of Information in a Smart House Environment
by: Moncrieff, Simon, et al.
Published: (2007)
by: Moncrieff, Simon, et al.
Published: (2007)
Defining and protecting meta privacy: A new conceptual framework within information privacy
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
PrivacyProtector: Privacy-Protected Patient Data Collection in IoT-Based Healthcare Systems
by: Luo, Entao, et al.
Published: (2018)
by: Luo, Entao, et al.
Published: (2018)
UPEM : user-centered privacy evaluation model in pervasive computing system.
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
UPEM : user-centered privacy evaluation model in pervasive computing systems.
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
When Trust Fails Purpose: Legislative Lessons from Police Access to the SafeWA COVID-19 Contact Tracing Data
by: Morris, Narrelle, et al.
Published: (2023)
by: Morris, Narrelle, et al.
Published: (2023)
Risk assessment for big data in cloud:security, privacy and trust
by: Yusof Ali, Hazirah Bee, et al.
Published: (2018)
by: Yusof Ali, Hazirah Bee, et al.
Published: (2018)
Ethics & trust in E-Commerce: Practitioners on security, privacy & Regulation.
by: Alfred, Chin Chuan How
Published: (2004)
by: Alfred, Chin Chuan How
Published: (2004)
Privacy under threats: an analysis on the online risks and legal measures in protecting privacy of children online
by: Abd. Jalil, Juriah
Published: (2014)
by: Abd. Jalil, Juriah
Published: (2014)
A dynamic compressed accessibility map for secure XML querying and updating
by: Mirabi, Meghdad, et al.
Published: (2015)
by: Mirabi, Meghdad, et al.
Published: (2015)
Character property method for Arabic text steganography with biometric multifactor authentication using liveness detection
by: Roslan, Nuur Alifah, et al.
Published: (2020)
by: Roslan, Nuur Alifah, et al.
Published: (2020)
Utilizing hippocratic database for personal information privacy protection
by: Mohamed Sidek, Zailani, et al.
Published: (2008)
by: Mohamed Sidek, Zailani, et al.
Published: (2008)
Similar Items
-
Performance and divisional trust and purpose-based access control for privacy preservation
by: Salji, Mohd Rafiz, et al.
Published: (2018) -
Role performance trust-based access control for protecting sensitive attributes
by: Salji, Mohd Rafiz, et al.
Published: (2016) -
Access control model based on trust, purpose, and role in materialized view for privacy protection
by: Salji, Mohd Rafiz
Published: (2019) -
Trust-based access control model with quantification method for protecting sensitive attributes
by: Salji, Mohd Rafiz, et al.
Published: (2022) -
An autonomous role and consideration of electronic health systems with access control in developed countries: a review
by: Salji, Mohd Rafiz, et al.
Published: (2023)