Part of the book series:Communications in Computer and Information Science ((CCIS,volume 186))
Included in the following conference series:
664Accesses
Abstract
Data-sharing agreements across organisations are often used to derive security policies to enforce the access, usage and routing or data across different trust and administrative domains. The data exchanged is usually annotated with metadata to describe its meaning in different applications and contexts, which may be used by the enforcement points of such data-sharing policies. In this paper, we present a metadata model for describing data-centric security, i.e. any security information that may be used to annotate data. Such metadata may be used to describe attributes of the data as well as their security requirements. We demonstrate an applicability scenario of our model in the context of organisations sharing scientific data.
This is a preview of subscription content,log in via an institution to check access.
Access this chapter
Subscribe and save
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Buy Now
- Chapter
- JPY 3498
- Price includes VAT (Japan)
- eBook
- JPY 5719
- Price includes VAT (Japan)
- Softcover Book
- JPY 7149
- Price includes VAT (Japan)
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Denning, D.: A Lattice Model of Secure information Flow. ACM Transactions on Programming Languages and Systems 19(5), 236–243 (1976)
Denker, G., Kagal, L., Finin, T.W., Paolucci, M., Sycara, K.P.: Security for DAML Web Services: Annotation and Matchmaking. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 335–350. Springer, Heidelberg (2003)
Ankolekar, A., Burstein, M.H., Hobbs, J.R., Lassila, O., Martin, D.L., McIlraith, S.A., Narayanan, S., Paolucci, M., Payne, T.R., Sycara, K.P., Zeng, H.: DAML-S: Semantic Markup for Web Services. In: SWWS, pp. 411–430 (2001)
Bartel, M., Boyer, J., Fox, B., LaMacchia, B., Simon, E.: XML Signature Syntax and Processing, 2nd edn. W3C Recommendation (June 2008)
Fikes, R., Jenkins, J., Frank, G.: JTP: A System Architecture and Component Library for Hybrid Reasoning. In: Proceedings of the Seventh World Multiconference on Systemics, Cybernetics, and Informatics, Orlando, Florida, USA (July 2003)
Kim, A., Luo, J., Kang, M.H.: Security Ontology for Annotating Resources. In: OTM Conferences, vol. (2), pp. 1483–1499 (2005)
Martin, D., Burstein, M., Hobbs, J., Lassila, O., McDermott, D., McIlraith, S., Narayanan, S., Paolucci, M., Parsia, B., Payne, T., Sirin, E., Srinivasan, N., Sycara, K.: OWL-S: Semantic Markup for Web Services. W3C Member Submission (November 2004)
Martimiano, L.A.F., dos Santos Moreira, E.: The evaluation process of a computer security incident ontology. In: de Freitas, F.L.G., Stuckenschmidt, H., Pinto, H.S., Malucelli, A. (eds.) Proceedings of the 2nd Workshop on Ontologies and their Applications (WONTO 2006). CEUR Workshop Proceedings, vol. 199. CEUR-WS.org (2006)
Crompton, S., Aziz, B., Wilson, M.: Sharing Scientific Data: Scenarios and Challenges. In: Proceedings of the W3C Workshop on Access Control Application Scenarios (2009)
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Rolebased access control models. Computer 29(2), 38–47 (1996)
Wang, L., Wijesekera, D., Jajodia, S.: A logic-based framework for attribute based access control. In: FMSE 2004: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, pp. 45–55. ACM, New York (2004)
Park, J., Sandhu, R.: The UCONabc Usage Control Model. ACM Transactions on Information and System Security 7(1), 128–174 (2004)
Peterson, W., Brown, D.: Cyclic Codes for Error Detection. Proceedings of the Institute of Radio Engineers 49, 228–235 (1961)
Brewer, D., Nash, M.: The chinese wall security policy. In: Proceedings of the 1989 IEEE Symposium on Security and Privacy, pp. 206–214. IEEE Computer Society Press, Oakland (1989)
N. B. of Standards, Data Encryption Standard, U.S. Department of Commerce. Tech. Rep. NBS FIPS PUB 46 (1997)
Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2), 120–126 (1978)
N. I. of Standards and Technology, Digital Signature Standard, U.S. Department of Commerce. Tech. Rep. FIPS PUB 186 (1994)
Matthews, B., Sufi, S., Flannery, D., Lerusse, L., Griffin, T., Gleaves, M., Kleese, K.: Using a Core Scientific Metadata Model in Large-Scale Facilities. International Journal of Digital Curation 5(1), 106–118 (2010)
Author information
Authors and Affiliations
School of Computing, University of Portsmouth, Portsmouth, U.K.
Benjmin Aziz
e-Science Centre, STFC Daresbury Laboratory, Warringston, U.K.
Shirley Crompton
e-Science Centre, STFC Rutherford Appleton Laboratory, Oxfordshire, U.K.
Michael Wilson
- Benjmin Aziz
You can also search for this author inPubMed Google Scholar
- Shirley Crompton
You can also search for this author inPubMed Google Scholar
- Michael Wilson
You can also search for this author inPubMed Google Scholar
Editor information
Editors and Affiliations
Department of Computer Science and Engineering, Seoul National University of Science and Technology, 172 Gongreung 2-dong, Nowon-gu, 139-742, Seoul, Korea
James J. Park
Computer Science Department, E.T.S.I. Informatica, University of Malaga, Campus de Teatinos, 29071, Malaga, Spain
Javier Lopez
Division of Computer Engineering, Mokwon University, Daejeon, South Korea
Sang-Soo Yeo
College of Information Technology, Division of Information and Computer Engineering, Ajou University, San 5, Woncheon-Dong, Yeongton-Gu, Suwon, 443-749, Korea
Taeshik Shon
Clayton School of Information Technology, Monash University, Campus: Clayton Building/Room 63/130, Clayton, 3800, Victoria, Australia
David Taniar
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Aziz, B., Crompton, S., Wilson, M. (2011). A Metadata Model for Data Centric Security. In: Park, J.J., Lopez, J., Yeo, SS., Shon, T., Taniar, D. (eds) Secure and Trust Computing, Data Management and Applications. STA 2011. Communications in Computer and Information Science, vol 186. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22339-6_3
Download citation
Publisher Name:Springer, Berlin, Heidelberg
Print ISBN:978-3-642-22338-9
Online ISBN:978-3-642-22339-6
eBook Packages:Computer ScienceComputer Science (R0)
Share this paper
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative