%0 Conference Proceedings %T Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control %+ University of Vienna [Vienna] %A Aldeen, Nisreen, Alam %A Quirchmayr, Gerald %Z Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES) %< avec comité de lecture %( Lecture Notes in Computer Science %B 1st International Conference on Information and Communication Technology (ICT-EurAsia) %C Yogyakarta, Indonesia %Y David Hutchison %Y Takeo Kanade %Y Madhu Sudan %Y Demetri Terzopoulos %Y Doug Tygar %Y Moshe Y. Vardi %Y Gerhard Weikum %Y Khabib Mustofa %Y Erich J. Neuhold %Y A Min Tjoa %Y Edgar Weippl %Y Ilsun You %Y Josef Kittler %Y Jon M. Kleinberg %Y Friedemann Mattern %Y John C. Mitchell %Y Moni Naor %Y Oscar Nierstrasz %Y C. Pandu Rangan %Y Bernhard Steffen %I Springer %3 Information and Communicatiaon Technology %V LNCS-7804 %P 441-446 %8 2013-03-25 %D 2013 %R 10.1007/978-3-642-36818-9_48 %K Privacy Protection %K De-perimeterisation (De-P) %K Data-level Access Control %K Self-Protecting Data %K X.509 certification %Z Computer Science [cs] %Z Humanities and Social Sciences/Library and information sciencesConference papers %X System-level access control methodologies depending on Perimeter Protection proofed their efficiency in the past, but the appearance of many new significant developments in digital communications highlighted the limitations of this approach. Increased concerns about the compatibility of system-level access control mechanism with new distributed and ubiquitous environments are turning aspirations towards de-perimeterisation protection and data level access control as solutions. This research does therefore try to make a contribution to privacy protection based on already advanced data-level access control work, such as the SPIDER project. The solution developed in this research suggests an X.509 certification extension to fit the data-level access control requirements, and proposes a new design for application structure in order to improve the identification and authentication-based secure data-level access control process. %G English %Z TC 5 %Z TC 8 %2 https://inria.hal.science/hal-01480201/document %2 https://inria.hal.science/hal-01480201/file/978-3-642-36818-9_48_Chapter.pdf %L hal-01480201 %U https://inria.hal.science/hal-01480201 %~ SHS %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC5 %~ IFIP-TC8 %~ IFIP-ICT-EURASIA %~ IFIP-LNCS-7804