Enforcing purpose of use via workflows

Mohammad Jafari, Reihaneh Safavi-Naini, Nicholas Paul Sheppard

Research output: Chapter in Book / Conference PaperConference Paperpeer-review

13 Citations (Scopus)

Abstract

One of the main privacy concerns of users when submitting their data to an organization is that their data will be used only for the specified purposes. Although privacy policies can specify the purpose, enforcing such policies remains a challenge. In this paper we propose an approach to enforcing purpose in access control systems that uses workflows. The intuition behind this approach is that purpose of access can be inferred, and hence associated with, the workflow in which the access takes place. We thus propose to encode purposes as properties of workflows used by organizations and show how this can be implemented. The approach is more general than other known approaches to purpose-based enforcement, and can be used to implement them. We argue the advantages of the new approach in terms of accuracy and expressiveness.
Original languageEnglish
Title of host publicationWPES '09: Proceedings of the 8th ACM workshop on Privacy in the Electronic Society, 9 November 2009, Chicago, Illinois, USA
PublisherACM
Pages113-116
Number of pages4
ISBN (Print)9781605587837
DOIs
Publication statusPublished - 2009
EventACM Workshop on Privacy in the Electronic Society -
Duration: 9 Nov 2009 → …

Publication series

Name
ISSN (Print)1543-7221

Conference

ConferenceACM Workshop on Privacy in the Electronic Society
Period9/11/09 → …

Keywords

  • access control
  • computer networks
  • privacy
  • security measures
  • work flow

Fingerprint

Dive into the research topics of 'Enforcing purpose of use via workflows'. Together they form a unique fingerprint.

Cite this