DocumentCode :
2973900
Title :
Malafide Intension and its mapping to Privacy Policy Purposes for Masquerading
Author :
Goyal, Vikram ; Gupta, Shyam K. ; Gupta, Anand
Author_Institution :
Comput. Sci. & Eng. Dept., I.I.T. Delhi, New Delhi
fYear :
2006
fDate :
Dec. 2006
Firstpage :
311
Lastpage :
312
Abstract :
In presence of a robust privacy infrastructure, an attacker can fulfil his purpose (malafide intension) only by masquerading it with bonafide purposes besides other authentication parameters. We address the issue of masquerading of purpose for a malafide intension by defining the mapping from a malafide intension to bonafide purposes in this paper. An understanding of such a mapping can facilitate both a hacker (assist him in masquerading) and a forensic expert to investigate malafide accesses. Determination of these bonafide purposes may help speed up the violation detection if the user accesses log has listed bonafide purpose with each user access. The bonafide purposes can be determined in data-independent (without accessing the database) or data-dependent (database access is required) mode. In this paper we define a mapping of a malafide intension to bonafide purposes in data-independent mode
Keywords :
computer crime; data privacy; relational databases; data-dependent mode; data-independent mode; malafide intension; masquerading; privacy policy; relational database; user access log; violation detection; Authentication; Banking; Computer hacking; Data privacy; Forensics; Information systems; Relational databases; Remuneration; Robustness; Web services;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Database Engineering and Applications Symposium, 2006. IDEAS '06. 10th International
Conference_Location :
Delhi
ISSN :
1098-8068
Print_ISBN :
0-7695-2577-6
Type :
conf
DOI :
10.1109/IDEAS.2006.30
Filename :
4041638
Link To Document :
بازگشت