Abstract:
Securing individual data objects using sticky policies in trusted networks is essential in user centric distributing computing applications. However aggregation of data o...Show MoreMetadata
Abstract:
Securing individual data objects using sticky policies in trusted networks is essential in user centric distributing computing applications. However aggregation of data objects presents a challenge in terms of sticky policy integrity for the new object. A possible solution is based on a mathematical merger of sticky polices associated with all aggregated data objects that respects all the individual policy rules in a new sticky policy for the data object. Whilst another approach is an aggregation using the policy enforcement framework of the trusted network to bypass the sticky rules. This process is enabled by the use of meta-polices that are introduced in this paper that explores the application both approaches in a employability demonstrator from the EU Framework 7 project TAS3 (Trusted Architecture for Securely Shared Services).
Published in: 2009 International Conference for Internet Technology and Secured Transactions, (ICITST)
Date of Conference: 09-12 November 2009
Date Added to IEEE Xplore: 29 January 2010
ISBN Information: