The Community for Technology Leaders
Social Computing / IEEE International Conference on Privacy, Security, Risk and Trust, 2010 IEEE International Conference on (2010)
Minneapolis, Minnesota, USA
Aug. 20, 2010 to Aug. 22, 2010
ISBN: 978-0-7695-4211-9
pp: 1050-1055
Information centers in industries are facing privacy concerns in recent years. Though there exists persuasive models, the privacy is not assured for industries that no identifiable information will get into unauthorized entities hands. They are based on user, role or service identification. In this paper we proposed Context Based Privacy Model(CBPM), which is based on context identification of the consultant. The major contribution of the paper is to disseminate information according to it's privacy policy rather than the content. CBPM uses a matrix which holds permissions for each context over sets of pieces of information having similar privacy policy. The steps involved in implementing CBPM is presented as an algorithm. The paper also presents the usability of the model through discussing a case and by implementing Bell-LaPadula model, Ethical Wall model and Information Flow models using CBPM.
Privacy models, Access Control Models

M. VenkataSwamy, N. Agarwal and S. Ramaswamy, "CBPM: Context Based Privacy Model," 2010 IEEE Second International Conference on Social Computing (SocialCom 2010). the Second IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT 2010)(SOCIALCOM), Minneapolis, MN, 2010, pp. 1050-1055.
81 ms
(Ver 3.3 (11022016))