• Publications
  • Influence
Beyond Purpose-Based Privacy Access Control
A personal information flow model that specifies a limited number of acts on this type of information and Chains of these acts can be used instead of the "intended/business purposes" used in privacy access control. Expand
On Information Lifecycle Management
  • S. Al-Fedaghi
  • Computer Science
  • IEEE Asia-Pacific Services Computing Conference
  • 9 December 2008
This paper contains a contribution toward developing a theoretical foundation for ILM, which provides the foundation for such categorization according to collected, processed, created, released, and transferred information. Expand
How to Calculate the Information Privacy
This paper introduces a new theoretical formalism to specify private information that utilizes single-referent linguistic assertions in defining ‘private information’ in terms of ‘atomicity’ and identification and shows that this discretion of information privacy enables it to perform set theory operations on pieces of private information about a person in order to calculate the relative amount of his/her information privacy. Expand
Aspects of Personal Information Theory
  • S. Al-Fedaghi
  • Political Science
  • IEEE Information Assurance Workshop
  • 21 June 2006
This paper demonstrates that there exists a ground for building personal information theory through the exploration of several notions such as personal information privacy, security, sharing, andExpand
Interpretation of Information Processing Regulations
This paper shows that a state-based model that includes all possibilities of information flow provides a foundation for the interpretation process and complements methods that extract software requirements by converting legal text into semiformal constraints and rules. Expand
Machine Recognition of Printed Arabic Text Utilizing Natural Language Morphology
A computer system for recognizing the printed Arabic text of multifonts contains four components: acquisition, segmentation, character recognition and word recognition, which results in an increase in the rate of word recognition by 6·97% using the proposed morphologically based method. Expand
Threat Risk Modeling
This paper proposes a flow-based model as an alternative methodology for identification and classification of threats. Expand
How sensitive is your personal information?
A theoretical analysis of personal information sensitivity is introduced and its scope is defined and a methodology is proposed that can be used for developing a classification scheme ofpersonal information. Expand
Mapping Considerations in the Design of Schemas for the Relational Model
A new design methodology is proposed that constructs the conceptual schema in such a way that overlappings among external schemas are reflected, and if transitivity is produced, then no such function is possible and a new technique is introduced to handle this special case. Expand
Experimentation with Personal Identifiable Information
Results suggest that decomposing PII into privacy-based portions helps in factoring out non-PII information and focusing on a proprietor’s related information and produces a visual map of the privacy sphere that can be used in approximating the sensitivity of different territories of privacy-related text. Expand