2010 Sixth International Conference on Information Assurance and Security 2010
DOI: 10.1109/isias.2010.5604183
|View full text |Cite
|
Sign up to set email alerts
|

End-to-end security policy description and management for collaborative system

Abstract: End-to-end security in collaborative system has two inferences: the secure delivery of service and the 'due usage' of it. The fulfillment of this requirement involves re-thinking the security policy model of collaborative systems. This paper analyses the factors that impact security in such systems. Based on this, a general architecture is proposed with a collaborationbased policy model specified for managing end-to-end security. An ontology base is introduced to enable different concept levels in policy expre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2012
2012
2014
2014

Publication Types

Select...
2
2

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…Such federated business paradigm brings new concerns about how to configure security among decentralized partners and how to protect resource in life-long scale. Fitting the open and collaborative Internet-based system paradigm, more adaptive attribute-based security policies (OASIS, 2005) (Su and Biennier, 2010) have been brought forward to express enriched security factors as well as consumption 'actions' upon resource. When applied to service composition scenarios, full lifecycle security for exchanged assets can be achieved with analysis of business process and adaption of security policies.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Such federated business paradigm brings new concerns about how to configure security among decentralized partners and how to protect resource in life-long scale. Fitting the open and collaborative Internet-based system paradigm, more adaptive attribute-based security policies (OASIS, 2005) (Su and Biennier, 2010) have been brought forward to express enriched security factors as well as consumption 'actions' upon resource. When applied to service composition scenarios, full lifecycle security for exchanged assets can be achieved with analysis of business process and adaption of security policies.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Our previous work (see [5] for more detail information) centers on a policy model that defines the access Rights upon the resource thanks to the refined attributes related to requester, resource and infrastructure, as well as obligations fulfilling on the granted rights. Policy is constructed through the logical combination of Assertion, which is a tuple:…”
Section: Security Policies For Collaborative Contextsmentioning
confidence: 99%
“…Security governance in collaborative enterprise needs not only a static trust assessment, but also a policy to express both participants' security requirements and regulations of the partner behavior, detailing "due usage" (namely information consumption actions) control to set a continuous protection of resources even beyond organization boundary and to coordinate requirements to set a consistent protection policy in a (dynamic) business federation. In former work [4], we brought to light one solution on continuously regulating (define, grant and deny) 'usage' policy upon corporate assets, giving these rights to a partner according to its 'Quality-of-protection'. This involves the expression of security factors ranging from the IT infrastructure to partner behaviour with a Collaboration Security Policy.…”
Section: Introductionmentioning
confidence: 99%
“…In former works we have proposed a collaborative usage control model that deduces the co-effect of policies [25] and an implementation architecture supporting 'usage control' enforcement [27]. It's our intention in this paper to complete our end-to-end security management framework, by developing a method for analyzing complex collaborative context and applying collaborative usage policy to manage asset sharing activities.…”
Section: Introductionmentioning
confidence: 99%