Movatterモバイル変換


[0]ホーム

URL:


Skip to main content

Advertisement

Springer Nature Link
Log in

A Metadata Model for Data Centric Security

  • Conference paper

Abstract

Data-sharing agreements across organisations are often used to derive security policies to enforce the access, usage and routing or data across different trust and administrative domains. The data exchanged is usually annotated with metadata to describe its meaning in different applications and contexts, which may be used by the enforcement points of such data-sharing policies. In this paper, we present a metadata model for describing data-centric security, i.e. any security information that may be used to annotate data. Such metadata may be used to describe attributes of the data as well as their security requirements. We demonstrate an applicability scenario of our model in the context of organisations sharing scientific data.

This is a preview of subscription content,log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide -see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Denning, D.: A Lattice Model of Secure information Flow. ACM Transactions on Programming Languages and Systems 19(5), 236–243 (1976)

    MathSciNet MATH  Google Scholar 

  2. Denker, G., Kagal, L., Finin, T.W., Paolucci, M., Sycara, K.P.: Security for DAML Web Services: Annotation and Matchmaking. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 335–350. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  3. Ankolekar, A., Burstein, M.H., Hobbs, J.R., Lassila, O., Martin, D.L., McIlraith, S.A., Narayanan, S., Paolucci, M., Payne, T.R., Sycara, K.P., Zeng, H.: DAML-S: Semantic Markup for Web Services. In: SWWS, pp. 411–430 (2001)

    Google Scholar 

  4. Bartel, M., Boyer, J., Fox, B., LaMacchia, B., Simon, E.: XML Signature Syntax and Processing, 2nd edn. W3C Recommendation (June 2008)

    Google Scholar 

  5. Fikes, R., Jenkins, J., Frank, G.: JTP: A System Architecture and Component Library for Hybrid Reasoning. In: Proceedings of the Seventh World Multiconference on Systemics, Cybernetics, and Informatics, Orlando, Florida, USA (July 2003)

    Google Scholar 

  6. Kim, A., Luo, J., Kang, M.H.: Security Ontology for Annotating Resources. In: OTM Conferences, vol. (2), pp. 1483–1499 (2005)

    Google Scholar 

  7. Martin, D., Burstein, M., Hobbs, J., Lassila, O., McDermott, D., McIlraith, S., Narayanan, S., Paolucci, M., Parsia, B., Payne, T., Sirin, E., Srinivasan, N., Sycara, K.: OWL-S: Semantic Markup for Web Services. W3C Member Submission (November 2004)

    Google Scholar 

  8. Martimiano, L.A.F., dos Santos Moreira, E.: The evaluation process of a computer security incident ontology. In: de Freitas, F.L.G., Stuckenschmidt, H., Pinto, H.S., Malucelli, A. (eds.) Proceedings of the 2nd Workshop on Ontologies and their Applications (WONTO 2006). CEUR Workshop Proceedings, vol. 199. CEUR-WS.org (2006)

    Google Scholar 

  9. Crompton, S., Aziz, B., Wilson, M.: Sharing Scientific Data: Scenarios and Challenges. In: Proceedings of the W3C Workshop on Access Control Application Scenarios (2009)

    Google Scholar 

  10. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Rolebased access control models. Computer 29(2), 38–47 (1996)

    Article  Google Scholar 

  11. Wang, L., Wijesekera, D., Jajodia, S.: A logic-based framework for attribute based access control. In: FMSE 2004: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, pp. 45–55. ACM, New York (2004)

    Chapter  Google Scholar 

  12. Park, J., Sandhu, R.: The UCONabc Usage Control Model. ACM Transactions on Information and System Security 7(1), 128–174 (2004)

    Article  Google Scholar 

  13. Peterson, W., Brown, D.: Cyclic Codes for Error Detection. Proceedings of the Institute of Radio Engineers 49, 228–235 (1961)

    MathSciNet  Google Scholar 

  14. Brewer, D., Nash, M.: The chinese wall security policy. In: Proceedings of the 1989 IEEE Symposium on Security and Privacy, pp. 206–214. IEEE Computer Society Press, Oakland (1989)

    Chapter  Google Scholar 

  15. N. B. of Standards, Data Encryption Standard, U.S. Department of Commerce. Tech. Rep. NBS FIPS PUB 46 (1997)

    Google Scholar 

  16. Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2), 120–126 (1978)

    Article MathSciNet MATH  Google Scholar 

  17. N. I. of Standards and Technology, Digital Signature Standard, U.S. Department of Commerce. Tech. Rep. FIPS PUB 186 (1994)

    Google Scholar 

  18. Matthews, B., Sufi, S., Flannery, D., Lerusse, L., Griffin, T., Gleaves, M., Kleese, K.: Using a Core Scientific Metadata Model in Large-Scale Facilities. International Journal of Digital Curation 5(1), 106–118 (2010)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. School of Computing, University of Portsmouth, Portsmouth, U.K.

    Benjmin Aziz

  2. e-Science Centre, STFC Daresbury Laboratory, Warringston, U.K.

    Shirley Crompton

  3. e-Science Centre, STFC Rutherford Appleton Laboratory, Oxfordshire, U.K.

    Michael Wilson

Authors
  1. Benjmin Aziz

    You can also search for this author inPubMed Google Scholar

  2. Shirley Crompton

    You can also search for this author inPubMed Google Scholar

  3. Michael Wilson

    You can also search for this author inPubMed Google Scholar

Editor information

Editors and Affiliations

  1. Department of Computer Science and Engineering, Seoul National University of Science and Technology, 172 Gongreung 2-dong, Nowon-gu, 139-742, Seoul, Korea

    James J. Park

  2. Computer Science Department, E.T.S.I. Informatica, University of Malaga, Campus de Teatinos, 29071, Malaga, Spain

    Javier Lopez

  3. Division of Computer Engineering, Mokwon University, Daejeon, South Korea

    Sang-Soo Yeo

  4. College of Information Technology, Division of Information and Computer Engineering, Ajou University, San 5, Woncheon-Dong, Yeongton-Gu, Suwon, 443-749, Korea

    Taeshik Shon

  5. Clayton School of Information Technology, Monash University, Campus: Clayton Building/Room 63/130, Clayton, 3800, Victoria, Australia

    David Taniar

Rights and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Aziz, B., Crompton, S., Wilson, M. (2011). A Metadata Model for Data Centric Security. In: Park, J.J., Lopez, J., Yeo, SS., Shon, T., Taniar, D. (eds) Secure and Trust Computing, Data Management and Applications. STA 2011. Communications in Computer and Information Science, vol 186. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22339-6_3

Download citation

Publish with us

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide -see info

Tax calculation will be finalised at checkout

Purchases are for personal use only


[8]ページ先頭

©2009-2025 Movatter.jp