Managing privacy, trust, security, and context relationships using weighted graph representations
- Authors: Skinner, Geoff , Miller, Mirka
- Date: 2006
- Type: Text , Journal article
- Relation: Transactions on Information Science and Applications Vol. 3, no. 2 (2006), p. 283-290
- Full Text: false
- Reviewed:
- Description: Determining who has access to personal data is an ongoing problem facing information system entities. The establishment of trust and its representation for known and unknown entities within the system further complicates access control rights allocation. One unique solution is through the application of graph representation to aid in the identification and management of privacy, trust and security requirements. Graphs provide a much better mental map than would textual information. In this paper we use graphs to represent informational relations concerning trust levels between entities for privacy and security requirements.
- Description: C1
- Description: 2003001598
Graph representation of access controls for managing privacy, trust and security requirements
- Authors: Miller, Mirka , Skinner, Geoff
- Date: 2005
- Type: Text , Conference paper
- Relation: Paper presented at the 4th WSEAS International Conference on Information Security, Communications and Computers, Tenerife, Spain : 16th -18th December, 2005
- Full Text: false
- Reviewed:
- Description: E1
- Description: 2003001396
Shield privacy Hippocratic security method for virtual community
- Authors: Skinner, Geoff , Chang, E. , McMahon, M. , Aisbett, J. , Miller, Mirka
- Date: 2004
- Type: Text , Conference paper
- Relation: Paper presented at IECON '04: The 30th Annual Conference of the IEEE Industrial Electronics Society, Busan, Korea : 2nd November, 2004
- Full Text: false
- Reviewed:
- Description: Pearlman et al., (2002) defines a virtual community as a large, multiinstitutional group of individuals who use a set of rules, a policy, to specify how to share their resources. With such a large collection of data stores in these resources, each of which could be data mined to different degrees, the privacy of each of the individuals needs to be protected. Within a virtual community, especially one also used to facilitate knowledge discovery, there are a number of privacy issues that must be addressed and resolved in ways other than through privacy laws and policies alone. This is due to the fact that, as to date, these laws have proved mainly ineffective and there is an ever growing concern by individuals about their privacy. Web surveys Srikant R. (2002) have identified that 82% of users have said improved privacy policies and methods would matter in Web environments. Agarwal R. (2002) highlights the fact that a secure collaborative environment, such as a virtual community, needs to provide authentication, authorization, privacy and data integrity. In this paper, we identify the technology issues, followed by the presentation of our proposed solution. We provide a conceptual framework of the Hippocratic security method to provide information security for shield privacy in virtual communities and we describe the architecture and design of the proposed solution. We outline the implementation, testing and evaluation strategies of our solutions. The proposed solution shall monitor the use of personal information as it is passed around the virtual community and protected information paths, data at rest, database and information resources through the use of the Hippocratic database principle to enforce Hippocratic security policies and procedures together with privacy preserving data mining Evfimievski et al., (2003) method for excellent information security in a virtual community environment.
- Description: E1
- Description: 2003000903