2014
DOI: 10.1016/j.cose.2013.08.011
|View full text |Cite
|
Sign up to set email alerts
|

Consistency and enforcement of access rules in cooperative data sharing environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 11 publications
0
10
0
Order By: Relevance
“…Le et al [156] assumed that there were pre-defined rule regulations in the data processing scenarios. An inconsistency checking and removing algorithm was designed to ensure the enforceability for multi-access to stored data in cloud servers.…”
Section: No Specific Solution Was Proposedmentioning
confidence: 99%
See 1 more Smart Citation
“…Le et al [156] assumed that there were pre-defined rule regulations in the data processing scenarios. An inconsistency checking and removing algorithm was designed to ensure the enforceability for multi-access to stored data in cloud servers.…”
Section: No Specific Solution Was Proposedmentioning
confidence: 99%
“…To protect sensitive data during the data transmission process, data encryption is usually utilized [153], [154]. For data protection on the cloud server, encryption scheme [149], [150], [151], a hierarchical data-accessing scheme [155], [156], [145], and other cyber technologies [21] were used. We believe that establishing an effective protocol in the platform is beneficial for both users and service providers.…”
Section: No Specific Solution Was Proposedmentioning
confidence: 99%
“…The enforceability issue can be illustrated as follows: If a party P is given access to R S but it and no other party has access to both R and S, it is not possible to actually compute R S. Alternately, some other party may be able to compute R S, but not get access to all the attributes that party P is given access to. We considered the issue of enforceability and potential changes to rules to ensure enforceability in [14]. In addition to direct changes to the rules, another way to enforce rules is by introducing trusted third parties (TP) that can obtain the necessary data and do the required manipulations.…”
Section: Introductionmentioning
confidence: 99%
“…In this paper we seek a single combined enforcement and query planning algorithm instead of the two different ones studied in [14] and [16]. For this, we consider the rules as queries also -which they are.…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, consistency is the main issue when thinking of replicated data in distributed systems (Meixing, Sushil & Krishna 2014). Maintaining the temporal consistency of time-constraint data is an ultimate goal of most researchers who are working in DRTDBS due to the relaxation of consistency at the expense of predictability.…”
Section: Related Workmentioning
confidence: 99%