Skip to main content

A Metadata Model for Data Centric Security

  • Conference paper
Book cover Secure and Trust Computing, Data Management and Applications (STA 2011)

Abstract

Data-sharing agreements across organisations are often used to derive security policies to enforce the access, usage and routing or data across different trust and administrative domains. The data exchanged is usually annotated with metadata to describe its meaning in different applications and contexts, which may be used by the enforcement points of such data-sharing policies. In this paper, we present a metadata model for describing data-centric security, i.e. any security information that may be used to annotate data. Such metadata may be used to describe attributes of the data as well as their security requirements. We demonstrate an applicability scenario of our model in the context of organisations sharing scientific data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Denning, D.: A Lattice Model of Secure information Flow. ACM Transactions on Programming Languages and Systems 19(5), 236–243 (1976)

    MathSciNet  MATH  Google Scholar 

  2. Denker, G., Kagal, L., Finin, T.W., Paolucci, M., Sycara, K.P.: Security for DAML Web Services: Annotation and Matchmaking. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 335–350. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  3. Ankolekar, A., Burstein, M.H., Hobbs, J.R., Lassila, O., Martin, D.L., McIlraith, S.A., Narayanan, S., Paolucci, M., Payne, T.R., Sycara, K.P., Zeng, H.: DAML-S: Semantic Markup for Web Services. In: SWWS, pp. 411–430 (2001)

    Google Scholar 

  4. Bartel, M., Boyer, J., Fox, B., LaMacchia, B., Simon, E.: XML Signature Syntax and Processing, 2nd edn. W3C Recommendation (June 2008)

    Google Scholar 

  5. Fikes, R., Jenkins, J., Frank, G.: JTP: A System Architecture and Component Library for Hybrid Reasoning. In: Proceedings of the Seventh World Multiconference on Systemics, Cybernetics, and Informatics, Orlando, Florida, USA (July 2003)

    Google Scholar 

  6. Kim, A., Luo, J., Kang, M.H.: Security Ontology for Annotating Resources. In: OTM Conferences, vol. (2), pp. 1483–1499 (2005)

    Google Scholar 

  7. Martin, D., Burstein, M., Hobbs, J., Lassila, O., McDermott, D., McIlraith, S., Narayanan, S., Paolucci, M., Parsia, B., Payne, T., Sirin, E., Srinivasan, N., Sycara, K.: OWL-S: Semantic Markup for Web Services. W3C Member Submission (November 2004)

    Google Scholar 

  8. Martimiano, L.A.F., dos Santos Moreira, E.: The evaluation process of a computer security incident ontology. In: de Freitas, F.L.G., Stuckenschmidt, H., Pinto, H.S., Malucelli, A. (eds.) Proceedings of the 2nd Workshop on Ontologies and their Applications (WONTO 2006). CEUR Workshop Proceedings, vol. 199. CEUR-WS.org (2006)

    Google Scholar 

  9. Crompton, S., Aziz, B., Wilson, M.: Sharing Scientific Data: Scenarios and Challenges. In: Proceedings of the W3C Workshop on Access Control Application Scenarios (2009)

    Google Scholar 

  10. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Rolebased access control models. Computer 29(2), 38–47 (1996)

    Article  Google Scholar 

  11. Wang, L., Wijesekera, D., Jajodia, S.: A logic-based framework for attribute based access control. In: FMSE 2004: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, pp. 45–55. ACM, New York (2004)

    Chapter  Google Scholar 

  12. Park, J., Sandhu, R.: The UCONabc Usage Control Model. ACM Transactions on Information and System Security 7(1), 128–174 (2004)

    Article  Google Scholar 

  13. Peterson, W., Brown, D.: Cyclic Codes for Error Detection. Proceedings of the Institute of Radio Engineers 49, 228–235 (1961)

    MathSciNet  Google Scholar 

  14. Brewer, D., Nash, M.: The chinese wall security policy. In: Proceedings of the 1989 IEEE Symposium on Security and Privacy, pp. 206–214. IEEE Computer Society Press, Oakland (1989)

    Chapter  Google Scholar 

  15. N. B. of Standards, Data Encryption Standard, U.S. Department of Commerce. Tech. Rep. NBS FIPS PUB 46 (1997)

    Google Scholar 

  16. Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2), 120–126 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  17. N. I. of Standards and Technology, Digital Signature Standard, U.S. Department of Commerce. Tech. Rep. FIPS PUB 186 (1994)

    Google Scholar 

  18. Matthews, B., Sufi, S., Flannery, D., Lerusse, L., Griffin, T., Gleaves, M., Kleese, K.: Using a Core Scientific Metadata Model in Large-Scale Facilities. International Journal of Digital Curation 5(1), 106–118 (2010)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Aziz, B., Crompton, S., Wilson, M. (2011). A Metadata Model for Data Centric Security. In: Park, J.J., Lopez, J., Yeo, SS., Shon, T., Taniar, D. (eds) Secure and Trust Computing, Data Management and Applications. STA 2011. Communications in Computer and Information Science, vol 186. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22339-6_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22339-6_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22338-9

  • Online ISBN: 978-3-642-22339-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics