Rule Enforcement with Third Parties in Secure Cooperative Data Access

Abstract : In this paper, we consider the scenario where a set of parties need to cooperate with one another. To safely exchange the information, a set of authorization rules is given to the parties. In some cases, a trusted third party is required to perform the expected operations. Since interactions with the third party can be expensive and there maybe risk of data exposure/misuse, it is important to minimize their use. We formulate the minimization problem and show the problem is in NP-hard. We then propose a greedy algorithm to find close to optimal solutions.
Document type :
Conference papers
Complete list of metadatas

https://hal.inria.fr/hal-01490712
Contributor : Hal Ifip <>
Submitted on : Wednesday, March 15, 2017 - 5:16:06 PM
Last modification on : Thursday, March 16, 2017 - 9:24:24 AM
Long-term archiving on : Friday, June 16, 2017 - 2:54:39 PM

File

978-3-642-39256-6_20_Chapter.p...
Files produced by the author(s)

Licence


Distributed under a Creative Commons Attribution 4.0 International License

Identifiers

Citation

Meixing Le, Krishna Kant, Sushil Jajodia. Rule Enforcement with Third Parties in Secure Cooperative Data Access. 27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.282-288, ⟨10.1007/978-3-642-39256-6_20⟩. ⟨hal-01490712⟩

Share

Metrics

Record views

80

Files downloads

76