Rule Enforcement with Third Parties in Secure Cooperative Data Access

Abstract : In this paper, we consider the scenario where a set of parties need to cooperate with one another. To safely exchange the information, a set of authorization rules is given to the parties. In some cases, a trusted third party is required to perform the expected operations. Since interactions with the third party can be expensive and there maybe risk of data exposure/misuse, it is important to minimize their use. We formulate the minimization problem and show the problem is in NP-hard. We then propose a greedy algorithm to find close to optimal solutions.
Type de document :
Communication dans un congrès
Lingyu Wang; Basit Shafiq. 27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. Springer, Lecture Notes in Computer Science, LNCS-7964, pp.282-288, 2013, Data and Applications Security and Privacy XXVII. 〈10.1007/978-3-642-39256-6_20〉
Liste complète des métadonnées

https://hal.inria.fr/hal-01490712
Contributeur : Hal Ifip <>
Soumis le : mercredi 15 mars 2017 - 17:16:06
Dernière modification le : jeudi 16 mars 2017 - 09:24:24
Document(s) archivé(s) le : vendredi 16 juin 2017 - 14:54:39

Fichier

978-3-642-39256-6_20_Chapter.p...
Fichiers produits par l'(les) auteur(s)

Licence


Distributed under a Creative Commons Paternité 4.0 International License

Identifiants

Citation

Meixing Le, Krishna Kant, Sushil Jajodia. Rule Enforcement with Third Parties in Secure Cooperative Data Access. Lingyu Wang; Basit Shafiq. 27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. Springer, Lecture Notes in Computer Science, LNCS-7964, pp.282-288, 2013, Data and Applications Security and Privacy XXVII. 〈10.1007/978-3-642-39256-6_20〉. 〈hal-01490712〉

Partager

Métriques

Consultations de la notice

56

Téléchargements de fichiers

18