Entry Jafari:2014:FEE from tissec.bib

Last update: Sun Oct 15 02:58:48 MDT 2017                Valid HTML 3.2!

Index sections

Top | Symbols | Numbers | Math | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

BibTeX entry

@Article{Jafari:2014:FEE,
  author =       "Mohammad Jafari and Reihaneh Safavi-Naini and Philip
                 W. L. Fong and Ken Barker",
  title =        "A Framework for Expressing and Enforcing Purpose-Based
                 Privacy Policies",
  journal =      j-TISSEC,
  volume =       "17",
  number =       "1",
  pages =        "3:1--3:??",
  month =        aug,
  year =         "2014",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/2629689",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Mon Aug 11 19:17:17 MDT 2014",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "Purpose is a key concept in privacy policies. Although
                 some models have been proposed for enforcing
                 purpose-based privacy policies, little has been done in
                 defining formal semantics for purpose, and therefore an
                 effective enforcement mechanism for such policies has
                 remained a challenge. We have developed a framework for
                 expressing and enforcing such policies by giving a
                 formal definition of purpose and proposing a
                 modal-logic language for formally expressing purpose
                 constraints. The semantics of this language are defined
                 over an abstract model of workflows. Based on this
                 formal framework, we discuss some properties of
                 purpose, show how common forms of purpose constraints
                 can be formalized, how purpose-based constraints can be
                 connected to more general access control policies, and
                 how they can be enforced in a workflow-based
                 information system by extending common access control
                 technologies.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

Related entries