{"title":"Privacy and Access Control: How are These Two concepts Related?","authors":"A. Squicciarini, Ting Yu","doi":"10.1145/2752952.2752980","DOIUrl":null,"url":null,"abstract":"Privacy issues are increasingly becoming important for many domains and applications. Many of such issues arise from the constant streaming of personal and sensitive data made available from lay users online, and also from the emerging widespread of highly ubiquitous and content-rich, personalized applications. Further, strong regulatory frameworks are now in place to ensure that users’ data is properly managed and protected. For instance, the responsible management of sensitive data is explicitly being mandated through laws such as the Sarbanes-Oaxley Act and the Health Insurance Portability and Accountability Act (HIPAA). Accordingly, data and user privacy have received substantial research attention over the past years. Several technical challenges have been tackled, including how to balance utility with the need to preserve privacy of individual data, and how to protect data from unwanted and unauthorized parties [5, 1, 6, 2]. In parallel, in response to several privacy outcries, many companies and organizations involved with users’ data collection and management (particularly online) have also made an effort toward introducing stronger privacy and access control solutions. Yet these efforts have been shown to be inadequate or insufficient [7]. Among the various methods and mechanisms to ensure users’ privacy, access control techniques are a well-established building block to protect users’ data. Historically, the mechanism for access control was considered only a support provided by database systems for sensitive structured data. Such a model of authorization is intuitive to application developers and users of the database system, but it only","PeriodicalId":305802,"journal":{"name":"Proceedings of the 20th ACM Symposium on Access Control Models and Technologies","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 20th ACM Symposium on Access Control Models and Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2752952.2752980","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Privacy issues are increasingly becoming important for many domains and applications. Many of such issues arise from the constant streaming of personal and sensitive data made available from lay users online, and also from the emerging widespread of highly ubiquitous and content-rich, personalized applications. Further, strong regulatory frameworks are now in place to ensure that users’ data is properly managed and protected. For instance, the responsible management of sensitive data is explicitly being mandated through laws such as the Sarbanes-Oaxley Act and the Health Insurance Portability and Accountability Act (HIPAA). Accordingly, data and user privacy have received substantial research attention over the past years. Several technical challenges have been tackled, including how to balance utility with the need to preserve privacy of individual data, and how to protect data from unwanted and unauthorized parties [5, 1, 6, 2]. In parallel, in response to several privacy outcries, many companies and organizations involved with users’ data collection and management (particularly online) have also made an effort toward introducing stronger privacy and access control solutions. Yet these efforts have been shown to be inadequate or insufficient [7]. Among the various methods and mechanisms to ensure users’ privacy, access control techniques are a well-established building block to protect users’ data. Historically, the mechanism for access control was considered only a support provided by database systems for sensitive structured data. Such a model of authorization is intuitive to application developers and users of the database system, but it only