{"title":"Privacy in Distributed Access Control Environment","authors":"Mbanaso Um","doi":"10.4172/2165-7866.1000236","DOIUrl":null,"url":null,"abstract":"Privacy in distributed environments introduces new security challenges since two parties in a typical access control may not always belong to the same security domain. Therefore, protection of personal identifiable information (PII) throws a fresh challenge in privacy equation in this context. Customarily, the challenge is how to preserve privacy when two parties in different security domains are involved in access control, particularly in distributed environments. This paper presents the conceptualization of privacy in typical distributed context, to raise issues when two parties in access control require protecting privacy sensitive information.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"8 1","pages":"1-5"},"PeriodicalIF":0.0000,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of information technology & software engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4172/2165-7866.1000236","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Privacy in distributed environments introduces new security challenges since two parties in a typical access control may not always belong to the same security domain. Therefore, protection of personal identifiable information (PII) throws a fresh challenge in privacy equation in this context. Customarily, the challenge is how to preserve privacy when two parties in different security domains are involved in access control, particularly in distributed environments. This paper presents the conceptualization of privacy in typical distributed context, to raise issues when two parties in access control require protecting privacy sensitive information.