Controlling data dissemination

Helge Janicke, Mohamed Sarrab, Hamza Aldabbas

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

We present a policy-based approach for the control of information flow between services. The controlled dissemination of information shared between services is achieved by the communication and enforcement of policies associated with shared information. The presented approach integrates easily as a communication middle-ware in existing service-based information systems keeping the management and distribution of policies transparent to the service implementation. This article focuses on the architecture and presents initial results that show the feasibility of the approach.

Original languageEnglish
Title of host publicationData Privacy Management and Autonomous Spontaneous Security - 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Revised Selected Papers
PublisherSpringer Verlag
Pages303-309
Number of pages7
ISBN (Print)9783642288784
DOIs
Publication statusPublished - 2012
Externally publishedYes
Event6th International Workshop on Data Privacy Management, DPM 2011 and 4th SETOP International Workshop on Autonomous and Spontaneous Security, SETOP 2011 - Leuven, Belgium
Duration: Sept 15 2011Sept 16 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7122 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other6th International Workshop on Data Privacy Management, DPM 2011 and 4th SETOP International Workshop on Autonomous and Spontaneous Security, SETOP 2011
Country/TerritoryBelgium
CityLeuven
Period9/15/119/16/11

Keywords

  • Discretionary access control
  • Dissemination control
  • Information flow
  • Policy-based management
  • Privacy

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Controlling data dissemination'. Together they form a unique fingerprint.

Cite this