Cardiff University | Prifysgol Caerdydd ORCA
Online Research @ Cardiff 
WelshClear Cookie - decide language by browser settings

Privacy enforcement through policy extension

Arunkumar, Sarith, Srivatsa, Mudhakar, Soyluoglu, Berker, Sensoy, Murat and Cerutti, Federico 2016. Privacy enforcement through policy extension. Presented at: MILCOM 2016 - 2016 IEEE Military Communications Conference, Baltimore, MD, USA, 1-3 November 2016.

PDF - Accepted Post-Print Version
Download (182kB) | Preview


Successful coalition operations require contributions from the coalition partners which might have hidden goals and desiderata in addition to the shared coalition goals. Therefore, there is an inevitable risk-utility trade-off for information producers due to the need-to-know vs. need-to-hide tension, which must take into account the trustworthiness of the other coalition partners. A balance is often achieved by deliberate obfuscation of the shared information. In this paper, we show how to integrate obfuscation capabilities within the current OASIS standard for access control policies, namely XACML.

Item Type: Conference or Workshop Item (Paper)
Date Type: Completion
Status: In Press
Schools: Computer Science & Informatics
Crime and Security Research Institute (CSURI)
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Related URLs:
Date of First Compliant Deposit: 7 October 2016
Last Modified: 31 Jan 2018 13:41

Actions (repository staff only)

Edit Item Edit Item


Downloads per month over past year

View more statistics