Skip to main content

Integrity Management in a Trusted Utilitarian Data Exchange Platform

  • Conference paper
On the Move to Meaningful Internet Systems: OTM 2014 Conferences (OTM 2014)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8841))

Abstract

Utilitarian data refers to data elements that can be readily put to use by one or more stakeholders. Utility of a data element is often subjective and intertwined in the sense that, a positive utility for one stakeholder may result in a negative utility for some other stakeholder. Also, credibility of utilitarian data is often established based on the credibility of its source. For this reason, defining and managing the integrity of utilitarian data exchanges is a non-trivial problem. This paper describes the problem of integrity management in an inter-organizational utilitarian data exchange platform, and introduces a credentials-based subsystem for managing integrity. Scalability is addressed based on mechanisms of privilege percolation though containment. Formal characteristics of the proposed model are derived based on an approach of adversarial scenario-handling.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agarwal, S., Sprick, B., Wortmann, S.: Credential based access control for semantic web services. In: AAAI Spring Symposium-Semantic Web Services, vol. 1 (2004)

    Google Scholar 

  2. Barker, S.: Personalizing access control by generalizing access control. In: Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, pp. 149–158. ACM (2010)

    Google Scholar 

  3. Bertino, E., Bonatti, P.A., Ferrari, E.: Trbac: A temporal role-based access control model. ACM Transactions on Information and System Security (TISSEC) 4(3), 191–233 (2001)

    Article  Google Scholar 

  4. Bhatti, R., Bertino, E., Ghafoor, A.: A trust-based context-aware access control model for web-services. Distributed and Parallel Databases 18(1), 83–105 (2005)

    Article  Google Scholar 

  5. Bhatti, R., Ghafoor, A., Bertino, E., Joshi, J.B.: X-gtrbac: an xml-based policy specification framework and architecture for enterprise-wide access control. ACM Transactions on Information and System Security (TISSEC) 8(2), 187–227 (2005)

    Article  Google Scholar 

  6. Chen, L., Crampton, J.: Risk-aware role-based access control. In: Meadows, C., Fernandez-Gago, C. (eds.) STM 2011. LNCS, vol. 7170, pp. 140–156. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  7. Fong, P.W.: Relationship-based access control: protection model and policy language. In: Proceedings of the First ACM Conference on Data and Application Security and Privacy, pp. 191–202. ACM (2011)

    Google Scholar 

  8. Joshi, J.B., Bertino, E., Latif, U., Ghafoor, A.: A generalized temporal role-based access control model. IEEE Transactions on Knowledge and Data Engineering 17(1), 4–23 (2005)

    Article  Google Scholar 

  9. Laurie, B.: Access control (v0. 1) (2009)

    Google Scholar 

  10. Lee, A.J.: Credential-based access control. In: Encyclopedia of Cryptography and Security, pp. 271–272. Springer (2011)

    Google Scholar 

  11. Ni, Q., Bertino, E., Lobo, J., Brodie, C., Karat, C.M., Karat, J., Trombeta, A.: Privacy-aware role-based access control. ACM Transactions on Information and System Security (TISSEC) 13(3), 24 (2010)

    Article  Google Scholar 

  12. Orłowska, E.: Kripke semantics for knowledge representation logics. Studia Logica 49(2), 255–272 (1990)

    Article  MATH  MathSciNet  Google Scholar 

  13. Sakharov, A.: Horn clause. From MathWorld–A Wolfram Web Resource, created by Eric W. Weisstein, http://mathworld.wolfram.com/HornClause.html

  14. Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control models. Computer 29(2), 38–47 (1996)

    Article  Google Scholar 

  15. Srinivasa, S.: Aggregating operational knowledge in community settings. In: Meersman, R., et al. (eds.) OTM 2012, Part II. LNCS, vol. 7566, pp. 789–796. Springer, Heidelberg (2012), http://dx.doi.org/10.1007/978-3-642-33615-7_23

    Google Scholar 

  16. Srinivasa, S., Agrawal, S., Jog, C., Deshmukh, J.: Characterizing utilitarian aggregation of open knowledge. In: Proceedings of First ACM IKDD Conference on Data Sciences, Delhi, pp. 789–796. ACM Digital Library (March 2014), http://dl.acm.org

  17. Vimercati, S.D.C.D., Foresti, S., Jajodia, S., Paraboschi, S., Psaila, G., Samarati, P.: Integrating trust management and access control in data-intensive web applications. ACM Transactions on the Web (TWEB) 6(2), 6 (2012)

    Google Scholar 

  18. Wang, T., Srivatsa, M., Liu, L.: Fine-grained access control of personal data. In: Proceedings of the 17th ACM symposium on Access Control Models and Technologies, pp. 145–156. ACM (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Agrawal, S., Jog, C., Srinivasa, S. (2014). Integrity Management in a Trusted Utilitarian Data Exchange Platform. In: Meersman, R., et al. On the Move to Meaningful Internet Systems: OTM 2014 Conferences. OTM 2014. Lecture Notes in Computer Science, vol 8841. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45563-0_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-45563-0_38

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-45562-3

  • Online ISBN: 978-3-662-45563-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics