Abstract
Utilitarian data refers to data elements that can be readily put to use by one or more stakeholders. Utility of a data element is often subjective and intertwined in the sense that, a positive utility for one stakeholder may result in a negative utility for some other stakeholder. Also, credibility of utilitarian data is often established based on the credibility of its source. For this reason, defining and managing the integrity of utilitarian data exchanges is a non-trivial problem. This paper describes the problem of integrity management in an inter-organizational utilitarian data exchange platform, and introduces a credentials-based subsystem for managing integrity. Scalability is addressed based on mechanisms of privilege percolation though containment. Formal characteristics of the proposed model are derived based on an approach of adversarial scenario-handling.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Agarwal, S., Sprick, B., Wortmann, S.: Credential based access control for semantic web services. In: AAAI Spring Symposium-Semantic Web Services, vol. 1 (2004)
Barker, S.: Personalizing access control by generalizing access control. In: Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, pp. 149–158. ACM (2010)
Bertino, E., Bonatti, P.A., Ferrari, E.: Trbac: A temporal role-based access control model. ACM Transactions on Information and System Security (TISSEC) 4(3), 191–233 (2001)
Bhatti, R., Bertino, E., Ghafoor, A.: A trust-based context-aware access control model for web-services. Distributed and Parallel Databases 18(1), 83–105 (2005)
Bhatti, R., Ghafoor, A., Bertino, E., Joshi, J.B.: X-gtrbac: an xml-based policy specification framework and architecture for enterprise-wide access control. ACM Transactions on Information and System Security (TISSEC) 8(2), 187–227 (2005)
Chen, L., Crampton, J.: Risk-aware role-based access control. In: Meadows, C., Fernandez-Gago, C. (eds.) STM 2011. LNCS, vol. 7170, pp. 140–156. Springer, Heidelberg (2012)
Fong, P.W.: Relationship-based access control: protection model and policy language. In: Proceedings of the First ACM Conference on Data and Application Security and Privacy, pp. 191–202. ACM (2011)
Joshi, J.B., Bertino, E., Latif, U., Ghafoor, A.: A generalized temporal role-based access control model. IEEE Transactions on Knowledge and Data Engineering 17(1), 4–23 (2005)
Laurie, B.: Access control (v0. 1) (2009)
Lee, A.J.: Credential-based access control. In: Encyclopedia of Cryptography and Security, pp. 271–272. Springer (2011)
Ni, Q., Bertino, E., Lobo, J., Brodie, C., Karat, C.M., Karat, J., Trombeta, A.: Privacy-aware role-based access control. ACM Transactions on Information and System Security (TISSEC)Â 13(3), 24 (2010)
Orłowska, E.: Kripke semantics for knowledge representation logics. Studia Logica 49(2), 255–272 (1990)
Sakharov, A.: Horn clause. From MathWorld–A Wolfram Web Resource, created by Eric W. Weisstein, http://mathworld.wolfram.com/HornClause.html
Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control models. Computer 29(2), 38–47 (1996)
Srinivasa, S.: Aggregating operational knowledge in community settings. In: Meersman, R., et al. (eds.) OTM 2012, Part II. LNCS, vol. 7566, pp. 789–796. Springer, Heidelberg (2012), http://dx.doi.org/10.1007/978-3-642-33615-7_23
Srinivasa, S., Agrawal, S., Jog, C., Deshmukh, J.: Characterizing utilitarian aggregation of open knowledge. In: Proceedings of First ACM IKDD Conference on Data Sciences, Delhi, pp. 789–796. ACM Digital Library (March 2014), http://dl.acm.org
Vimercati, S.D.C.D., Foresti, S., Jajodia, S., Paraboschi, S., Psaila, G., Samarati, P.: Integrating trust management and access control in data-intensive web applications. ACM Transactions on the Web (TWEB)Â 6(2), 6 (2012)
Wang, T., Srivatsa, M., Liu, L.: Fine-grained access control of personal data. In: Proceedings of the 17th ACM symposium on Access Control Models and Technologies, pp. 145–156. ACM (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Agrawal, S., Jog, C., Srinivasa, S. (2014). Integrity Management in a Trusted Utilitarian Data Exchange Platform. In: Meersman, R., et al. On the Move to Meaningful Internet Systems: OTM 2014 Conferences. OTM 2014. Lecture Notes in Computer Science, vol 8841. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45563-0_38
Download citation
DOI: https://doi.org/10.1007/978-3-662-45563-0_38
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-45562-3
Online ISBN: 978-3-662-45563-0
eBook Packages: Computer ScienceComputer Science (R0)