DocumentCode :
3342258
Title :
Aggregating policies in user centric, real-time and distributed applications
Author :
Kirkham, T. ; Dahn, I. ; Chadwick, D. ; Santos, M. ; Winfield, S.
Author_Institution :
Univ. of Nottingham, Nottingham, UK
fYear :
2009
fDate :
9-12 Nov. 2009
Firstpage :
1
Lastpage :
6
Abstract :
Securing individual data objects using sticky policies in trusted networks is essential in user centric distributing computing applications. However aggregation of data objects presents a challenge in terms of sticky policy integrity for the new object. A possible solution is based on a mathematical merger of sticky polices associated with all aggregated data objects that respects all the individual policy rules in a new sticky policy for the data object. Whilst another approach is an aggregation using the policy enforcement framework of the trusted network to bypass the sticky rules. This process is enabled by the use of meta-polices that are introduced in this paper that explores the application both approaches in a employability demonstrator from the EU Framework 7 project TAS3 (Trusted Architecture for Securely Shared Services).
Keywords :
computer applications; computer network security; government policies; information services; security of data; user centred design; EU framework 7 project; TAS3; data objects; meta-polices; policy enforcement framework; real-time applications; sticky policies; trusted architecture for securely shared services; trusted networks; user centric distributing computing applications; Application software; Collaboration; Computer applications; Computer networks; Context-aware services; Corporate acquisitions; Data security; Distributed computing; Supply chains; Web services;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Internet Technology and Secured Transactions, 2009. ICITST 2009. International Conference for
Conference_Location :
London
Print_ISBN :
978-1-4244-5647-5
Type :
conf
DOI :
10.1109/ICITST.2009.5402553
Filename :
5402553
Link To Document :
بازگشت