Database Security XII 1999
DOI: 10.1007/978-0-387-35564-1_8
|View full text |Cite
|
Sign up to set email alerts
|

Secure Mediation: Requirements and Design

Abstract: Abstract:In this paper 1 we discuss the security requirements for mediation, and present our approach towards satisfying them, with an emphasis on confidentiality and authenticity. Furthermore we outline the design of the basic security mechanisms for mediators. Our basic approach suitably combines the concepts of credentials, for authentic authorization with some kind of anonymity, and of asymmetric encryption, for confidentiality, and it can be extended to include additional mechanisms like digital signature… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

1999
1999
2008
2008

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 23 publications
0
9
0
Order By: Relevance
“…An important requirement of emerging system is to be able to share information with other systems [1,8,10]. When a system needs to allow previously unknown entities to access its resources, mechanisms should be in place to ensure that the accesses granted are limited to pre-defined sharing requirements.…”
Section: The Idrm Problemmentioning
confidence: 99%
“…An important requirement of emerging system is to be able to share information with other systems [1,8,10]. When a system needs to allow previously unknown entities to access its resources, mechanisms should be in place to ensure that the accesses granted are limited to pre-defined sharing requirements.…”
Section: The Idrm Problemmentioning
confidence: 99%
“…Such features make · 1 RBAC better suited for handling access control requirements of diverse organizations. RBAC models have also been found suitable for addressing security issues in the Internet environment [Barkley et al 1997], , [Park et al 2001] and show promise for newer heterogeneous multi-domain environments that raise serious concerns related to access control across domain boundaries [Biskup et al 1998], ].…”
Section: Introductionmentioning
confidence: 99%
“…A mediator manages queries on behalf of a user by identifying and addressing appropriate subqueries to heterogeneous and autonomous data sources and by subsequently collecting and integrating the returned answers. A previously reported approach to secure mediation [BFK99,BFK98] is based on a public-key infrastructure and cryptographically signed credentials that encode the eligibility of users. These technologies potentially provide for an inherently scalable and secure mechanism for widely distributing assured authentication and authorization attributes.…”
Section: Introductionmentioning
confidence: 99%
“…These technologies potentially provide for an inherently scalable and secure mechanism for widely distributing assured authentication and authorization attributes. Secure mediation is roughly outlined as follows [BFK99,BFK98]. A user submits evidence of being eligible for seeing the answer to a query by submitting certified personal authorization attributes which are encoded in credentials.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation