Publication: Privacy enforcement through policy extension
dc.contributor.author | Arunkumar, S. | |
dc.contributor.author | Srivatsa, M. | |
dc.contributor.author | Soyluoglu, Berker | |
dc.contributor.author | Şensoy, Murat | |
dc.contributor.author | Cerutti, F. | |
dc.contributor.department | Computer Science | |
dc.contributor.ozuauthor | ŞENSOY, Murat | |
dc.contributor.ozugradstudent | Soyluoglu, Berker | |
dc.date.accessioned | 2017-06-17T13:54:23Z | |
dc.date.available | 2017-06-17T13:54:23Z | |
dc.date.issued | 2016 | |
dc.description.abstract | Successful coalition operations require contributions from the coalition partners which might have hidden goals and desiderata in addition to the shared coalition goals. Therefore, there is an inevitable risk-utility trade-off for information producers due to the need-to-know vs. need-to-hide tension, which must take into account the trustworthiness of the other coalition partners. A balance is often achieved by deliberate obfuscation of the shared information. In this paper, we show how to integrate obfuscation capabilities within the current OASIS standard for access control policies, namely XACML. | |
dc.description.sponsorship | US Army Research laboratory ; the UK Ministry of Defence | |
dc.identifier.doi | 10.1109/MILCOM.2016.7795476 | |
dc.identifier.issn | 2155-7578 | |
dc.identifier.scopus | 2-s2.0-85011802414 | |
dc.identifier.uri | https://doi.org/10.1109/MILCOM.2016.7795476 | |
dc.identifier.wos | 000391433600185 | |
dc.language.iso | eng | en_US |
dc.peerreviewed | yes | |
dc.publicationstatus | published | en_US |
dc.publisher | IEEE | en_US |
dc.relation.ispartof | Military Communications Conference, MILCOM 2016 - 2016 IEEE | |
dc.relation.publicationcategory | International | |
dc.rights | info:eu-repo/semantics/restrictedAccess | |
dc.subject.keywords | Context | |
dc.subject.keywords | Standards | |
dc.subject.keywords | Authorization | |
dc.subject.keywords | Process control | |
dc.subject.keywords | Privacy | |
dc.subject.keywords | Information management | |
dc.title | Privacy enforcement through policy extension | en_US |
dc.type | Conference paper | en_US |
dspace.entity.type | Publication | |
relation.isOrgUnitOfPublication | 85662e71-2a61-492a-b407-df4d38ab90d7 | |
relation.isOrgUnitOfPublication.latestForDiscovery | 85662e71-2a61-492a-b407-df4d38ab90d7 |