Cross-Layer Data-Centric Usage Control

نویسنده

  • Enrico Lovat
چکیده

Usage control (UC) is concerned with what happens to data after access has been granted, and is usually defined on the grounds of events that, somehow, are related to data. Data may assume different representations within the system, possibly at several levels of abstraction. This research aims at extending a generic event-driven UC model and its language [1] by the explicit distinction between data and representations of data. The resulting system will be able to enforce policies for single representations (e.g., delete f1.txt after thirty days) as well as for all representations of the same data at once (e.g., if f2.txt is a copy of f1.txt, also f2.txt will be deleted). To this end, different data-flow tracking approaches will be investigated. The result will be implemented, instantiated and evaluated in terms of security, precision and performance.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Access control in ultra-large-scale systems using a data-centric middleware

  The primary characteristic of an Ultra-Large-Scale (ULS) system is ultra-large size on any related dimension. A ULS system is generally considered as a system-of-systems with heterogeneous nodes and autonomous domains. As the size of a system-of-systems grows, and interoperability demand between sub-systems is increased, achieving more scalable and dynamic access control system becomes an im...

متن کامل

Grounding Data Purpose And Data Usage For Better Privacy Requirements Development: An Information System Perspective

Data purpose is a central concept to modeling privacy requirements for information systems. Existing purpose-centric approaches for privacy protection have mainly focused on access control. The problem of ensuring the consistency between data purpose and data usage has been under-addressed. Given the lack of practical purpose-centric solutions, we argue that a grounded understanding of the unde...

متن کامل

A MAC Centric Cross Layer Approach for H.264 Video Streaming over HSDPA

This paper proposes a MAC centric cross-layer approach for H.264 video streaming over HSDPA wireless links. Our solution is based on minimal interactions between the RLC (Radio Link Control layer) and the application layer (i.e. H.264 encoder) in order to give video packets different importance values according to the semantic of their contents. The performance of our proposed solution is evalu...

متن کامل

Using cross-layer metrics to improve the performance of end-to-end handover mechanisms

Network centric handover solutions for all IP wireless networks usually require modifications to network infrastructure which can stifle any potential rollout. This has led researchers to begin looking at alternative approaches. Endpoint centric handover solutions do not require network infrastructure modification, thereby alleviating a large barrier to deployment. Current endpoint centric solu...

متن کامل

User Evaluation of a Community-centric Music Voting Service

In this paper, we present the user evaluation results of a Community-centric Music Voting service that relies on a DHT-based P2P network. For each user community, an independent DHT-overlay is established. These separate DHT-overlays are then connected to specific commercial premises or larger areas. A user evaluation was conducted in a real usage environment, where the user communities were co...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014