Representation-independent data usage control

Alexander Pretschner, Enrico Lovat, Matthias Büchler

Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

21 Zitate (Scopus)

Abstract

Usage control is concerned with what happens to data after access has been granted. In the literature, usage control models have been defined on the grounds of events that, somehow, are related to data. In order to better cater to the dimension of data, we extend a usage control model by the explicit distinction between data and representation of data. A data flow model is used to track the flow of data in-between different representations. The usage control model is then extended so that usage control policies can address not just one single representation (e.g., delete file1.txt after thirty days) but rather all representations of the data (e.g., if file1.txt is a copy of file2.txt, also delete file2.txt). We present three proof-of-concept implementations of the model, at the operating system level, at the browser level, and at the X11 level, and also provide an ad-hoc implementation for multi-layer enforcement.

OriginalspracheEnglisch
TitelData Privacy Management and Autonomous Spontaneous Security - 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Revised Selected Papers
Herausgeber (Verlag)Springer Verlag
Seiten122-140
Seitenumfang19
ISBN (Print)9783642288784
DOIs
PublikationsstatusVeröffentlicht - 2012
Extern publiziertJa
Veranstaltung6th International Workshop on Data Privacy Management, DPM 2011 and 4th SETOP International Workshop on Autonomous and Spontaneous Security, SETOP 2011 - Leuven, Belgien
Dauer: 15 Sept. 201116 Sept. 2011

Publikationsreihe

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Band7122 LNCS
ISSN (Print)0302-9743
ISSN (elektronisch)1611-3349

Konferenz

Konferenz6th International Workshop on Data Privacy Management, DPM 2011 and 4th SETOP International Workshop on Autonomous and Spontaneous Security, SETOP 2011
Land/GebietBelgien
OrtLeuven
Zeitraum15/09/1116/09/11

Fingerprint

Untersuchen Sie die Forschungsthemen von „Representation-independent data usage control“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren