Abstract
Data-sharing agreements across organisations are often used to derive security policies to enforce the access, usage and routing or data across different trust and administrative domains. The data exchanged is usually annotated with metadata to describe its meaning in different applications and contexts, which may be used by the enforcement points of such data-sharing policies. In this paper, we present a metadata model for describing data-centric security, i.e. any security information that may be used to annotate data. Such metadata may be used to describe attributes of the data as well as their security requirements. We demonstrate an applicability scenario of our model in the context of organisations sharing scientific data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Denning, D.: A Lattice Model of Secure information Flow. ACM Transactions on Programming Languages and Systems 19(5), 236–243 (1976)
Denker, G., Kagal, L., Finin, T.W., Paolucci, M., Sycara, K.P.: Security for DAML Web Services: Annotation and Matchmaking. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 335–350. Springer, Heidelberg (2003)
Ankolekar, A., Burstein, M.H., Hobbs, J.R., Lassila, O., Martin, D.L., McIlraith, S.A., Narayanan, S., Paolucci, M., Payne, T.R., Sycara, K.P., Zeng, H.: DAML-S: Semantic Markup for Web Services. In: SWWS, pp. 411–430 (2001)
Bartel, M., Boyer, J., Fox, B., LaMacchia, B., Simon, E.: XML Signature Syntax and Processing, 2nd edn. W3C Recommendation (June 2008)
Fikes, R., Jenkins, J., Frank, G.: JTP: A System Architecture and Component Library for Hybrid Reasoning. In: Proceedings of the Seventh World Multiconference on Systemics, Cybernetics, and Informatics, Orlando, Florida, USA (July 2003)
Kim, A., Luo, J., Kang, M.H.: Security Ontology for Annotating Resources. In: OTM Conferences, vol. (2), pp. 1483–1499 (2005)
Martin, D., Burstein, M., Hobbs, J., Lassila, O., McDermott, D., McIlraith, S., Narayanan, S., Paolucci, M., Parsia, B., Payne, T., Sirin, E., Srinivasan, N., Sycara, K.: OWL-S: Semantic Markup for Web Services. W3C Member Submission (November 2004)
Martimiano, L.A.F., dos Santos Moreira, E.: The evaluation process of a computer security incident ontology. In: de Freitas, F.L.G., Stuckenschmidt, H., Pinto, H.S., Malucelli, A. (eds.) Proceedings of the 2nd Workshop on Ontologies and their Applications (WONTO 2006). CEUR Workshop Proceedings, vol. 199. CEUR-WS.org (2006)
Crompton, S., Aziz, B., Wilson, M.: Sharing Scientific Data: Scenarios and Challenges. In: Proceedings of the W3C Workshop on Access Control Application Scenarios (2009)
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Rolebased access control models. Computer 29(2), 38–47 (1996)
Wang, L., Wijesekera, D., Jajodia, S.: A logic-based framework for attribute based access control. In: FMSE 2004: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, pp. 45–55. ACM, New York (2004)
Park, J., Sandhu, R.: The UCONabc Usage Control Model. ACM Transactions on Information and System Security 7(1), 128–174 (2004)
Peterson, W., Brown, D.: Cyclic Codes for Error Detection. Proceedings of the Institute of Radio Engineers 49, 228–235 (1961)
Brewer, D., Nash, M.: The chinese wall security policy. In: Proceedings of the 1989 IEEE Symposium on Security and Privacy, pp. 206–214. IEEE Computer Society Press, Oakland (1989)
N. B. of Standards, Data Encryption Standard, U.S. Department of Commerce. Tech. Rep. NBS FIPS PUB 46 (1997)
Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2), 120–126 (1978)
N. I. of Standards and Technology, Digital Signature Standard, U.S. Department of Commerce. Tech. Rep. FIPS PUB 186 (1994)
Matthews, B., Sufi, S., Flannery, D., Lerusse, L., Griffin, T., Gleaves, M., Kleese, K.: Using a Core Scientific Metadata Model in Large-Scale Facilities. International Journal of Digital Curation 5(1), 106–118 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Aziz, B., Crompton, S., Wilson, M. (2011). A Metadata Model for Data Centric Security. In: Park, J.J., Lopez, J., Yeo, SS., Shon, T., Taniar, D. (eds) Secure and Trust Computing, Data Management and Applications. STA 2011. Communications in Computer and Information Science, vol 186. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22339-6_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-22339-6_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22338-9
Online ISBN: 978-3-642-22339-6
eBook Packages: Computer ScienceComputer Science (R0)