Rule Enforcement with Third Parties in Secure Cooperative Data Access
نویسندگان
چکیده
In this paper, we consider the scenario where a set of parties need to cooperate with one another. To safely exchange the information, a set of authorization rules is given to the parties. In some cases, a trusted third party is required to perform the expected operations. Since interactions with the third party can be expensive and there maybe risk of data exposure/misuse, it is important to minimize their use. We formulate the minimization problem and show the problem is in NP -hard. We then propose a greedy algorithm to find close to optimal solutions.
منابع مشابه
Minimum cost rule enforcement for cooperative database access
In this paper, we consider restricted data sharing between a set of parties that wish to provide some set of online services requiring such data sharing. Each party is assumed to store its data in private relational databases, and is given a set of mutually agreed set of authorization rules that specify access to attributes over individual relations or joins over relations owned by one or more ...
متن کاملOn Privacy-compliant Disclosure of Personal Data to Third Parties using Digital Watermarking
Privacy in business processes for providing personalized services is currently a matter of trust. Business processes require the disclosure of personal data to third parties and users are not able to control their usage and so their further disclosure. Existing privacy-enhancing technologies consider access control but not usage control of personal data. The current work on usage control mainly...
متن کاملConsistency and enforcement of access rules in cooperative data sharing environment
In this paper we consider the situation where a set of enterprises need to collaborate to provide rich services to their clients. An enterprise may need information from several other collaborating parties to satisfy its business requirements. Such collaboration often requires controlled access to one another’s data, which we assume is stored in standard relational form. We assume that a set of...
متن کاملConsistent Query Plan Generation in Secure Cooperative Data Access
In this paper, we consider an environment where a group of parties have their own relational databases, and provide restricted access to other parties. In order to implement desired bushiness services, each party defines a set of authorization rules over the join of basic relations, and the accessible information is constrained by these rules. However, authorization rules are given based on the...
متن کاملRule Configuration Checking in Secure Cooperative Data Access
Abstract—In this paper, we consider an environment where a group of parties have their own relational databases and provide restricted access to other parties. In order to implement desired business services. each party defines a set of authorization rules over the join of basic relations, and these rules can be viewed as the configurations of the accessible information in the cooperative data ...
متن کامل