Share This Author
TRBAC: a temporal role-based access control model
- E. Bertino, P. Bonatti, E. Ferrari
- Computer ScienceACM Workshop on Role-Based Access Control
- 26 July 2000
Temporal-RBAC (TRBAC), an extensions of the RBAC model, supports both periodic activations and deactivations of roles, and temporal dependencies among such actions, expressed by means of role triggers.
A generalized temporal role-based access control model
- J. Joshi, E. Bertino, Usman Latif, A. Ghafoor
- Computer ScienceIEEE Transactions on Knowledge and Data…
This work proposes a generalized temporal role-based access control (GTRBAC) model capable of expressing a wider range of temporal constraints and allows expressing periodic as well as duration constraints on roles, user-role assignments, and role-permission assignments.
GEO-RBAC: a spatially aware RBAC
- E. Bertino, B. Catania, M. Damiani, P. Perlasca
- Computer ScienceACM Symposium on Access Control Models and…
- 1 June 2005
This paper presents GEO-RBAC, an extension of the RBAC model to deal with spatial and location-based information and introduces the concept of role schema, which is extended to cope with hierarchies, modeling permission, user, and activation inheritance.
The specification and enforcement of authorization constraints in workflow management systems
A language is presented to express both static and dynamic authorization constraints as clauses in a logic program and formal notions of constraint consistency are provided to check the consistency of constraints and assign users and roles to tasks that constitute the workflow in such a way that no constraints are violated.
State-of-the-art in privacy preserving data mining
- V. Verykios, E. Bertino, I. N. Fovino, L. P. Provenza, Y. Saygin, Y. Theodoridis
- Computer ScienceSGMD
- 1 March 2004
An overview of the new and rapidly emerging research area of privacy preserving data mining is provided, and a classification hierarchy that sets the basis for analyzing the work which has been performed in this context is proposed.
Efficient k -Anonymization Using Clustering Techniques
- Ji-Won Byun, Ashish Kamra, E. Bertino, Ninghui Li
- Computer ScienceInternational Conference on Database Systems for…
- 9 April 2007
An approach that uses the idea of clustering to minimize information loss and thus ensure good data quality is proposed, and a suitable metric to estimate the information loss introduced by generalizations is developed, which works for both numeric and categorical data.
Database security - concepts, approaches, and challenges
The most relevant concepts underlying the notion of database security are surveyed and the most well-known techniques are summarized, and access control systems are described, namely, the discretionary and mandatory access control models, and the role-based access control (RBAC) model.
Secure and selective dissemination of XML documents
This article defines a formal model of access control policies for XML documents and proposes an approach, based on an extension of the Cryptolope#8482; approach, which essentially allows one to send the same document to all users, and yet to enforce the statedAccess control policies.
Preserving User Location Privacy in Mobile Data Management Infrastructures
- Reynold Cheng, Yu Zhang, E. Bertino, S. Prabhakar
- Computer ScienceInternational Symposium on Privacy Enhancing…
- 28 June 2006
A data model to augment uncertainty to location data is suggested, and imprecise queries that hide the location of the query issuer and yields probabilistic results are proposed that investigate the evaluation and quality aspects for a range query.
Privacy preserving schema and data matching
A protocol for record matching that preserves privacy both at the data level and at the schema level is proposed, and by running the protocol two sources can compute the matching of their datasets without sharing their data in clear and only sharing the result of the matching.