Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security 2006
DOI: 10.1145/1128817.1128820
|View full text |Cite
|
Sign up to set email alerts
|

Secure information sharing enabled by Trusted Computing and PEI models

Abstract: The central goal of secure information sharing is to "share but protect" where the motivation to "protect" is to safeguard the sensitive content from unauthorized disclosure (in contrast to protecting the content to avoid loss of revenue as in retail Digital Rights Management). This elusive goal has been a major driver for information security for over three decades. Recently, the need for secure information sharing has dramatically increased with the explosion of the Internet and the convergence of outsourcin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
47
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
6
3
1

Relationship

1
9

Authors

Journals

citations
Cited by 67 publications
(50 citation statements)
references
References 36 publications
0
47
0
Order By: Relevance
“…In [4] the author suggested a robust authentication user portal framework which incorporated user's data to meet the dynamic environmental data changes. It proved to be a very responsive framework and came with dynamic policy handling system.…”
Section: Literature Survey and Related Workmentioning
confidence: 99%
“…In [4] the author suggested a robust authentication user portal framework which incorporated user's data to meet the dynamic environmental data changes. It proved to be a very responsive framework and came with dynamic policy handling system.…”
Section: Literature Survey and Related Workmentioning
confidence: 99%
“…Sandhu et al [20] defined a family of Policy, Enforcement and Implementation (PEI) frameworks. TC is used to seal the decryption keys for the data into trusted VMs.…”
Section: Related Workmentioning
confidence: 99%
“…Over the years, research on information security has focused on controlling the use of information resource through various models that have been proposed; from traditional access control, with its derivatives such as MAC, DAC, RBAC to TM and DRM. [1][2][3][4][5][6][7][8][9][10]Access control has been a key component of security solution to supporting finegrained articulated protection for shared data and resources by known users in a closed environment in the past. Trust management has worked on traditional access control by considering unknown users with regards to their credentials.…”
Section: Introductionmentioning
confidence: 99%