• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

Providing Security and Interoperation of Heterogeneous Systems. Distributed Parallel Databases, (2000)

by Steven Dawson, Shelly Qian, Pierangela Samarati
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 25
Next 10 →

SkyQuery: A Web Service Approach to Federate Databases

by Tanu Malik, Alex S. Szalay, Tamas Budavari, Ani R. Thakar - In Proc. CIDR , 2003
"... Traditional science searched for new objects and phenomena that led to discoveries. Tomorrow's science will combine together the large pool of information in scientific archives and make discoveries. Scientists are currently keen to federate together the existing scientific databases. The major ..."
Abstract - Cited by 36 (7 self) - Add to MetaCart
Traditional science searched for new objects and phenomena that led to discoveries. Tomorrow's science will combine together the large pool of information in scientific archives and make discoveries. Scientists are currently keen to federate together the existing scientific databases. The major challenge in building a federation of these autonomous and heterogeneous databases is system integration. Ineffective integration will result in defunct federations and under utilized scientific data. Astronomy, in particular, has many autonomous archives spread over the Internet. It is now seeking to federate these, with minimal effort, into a Virtual Observatory that will solve complex distributed computing tasks such as answering federated spatial join queries. In this paper, we present SkyQuery, a successful prototype of an evolving federation of astronomy archives. It interoperates using the emerging Web services standard. We describe the SkyQuery architecture and show how it efficiently evaluates a probabilistic federated spatial join query. 1.
(Show Context)

Citation Context

...nd/or special permission from the Endowment Proceedings of the 2003 CIDR Conference thus examine each object in more detail. Similar needs to federate are also felt in pharmaceutical [UFI01], medical =-=[Daw00]-=-, geographical [Arn98], and other scientific archives. A federated database is a collection of cooperating but autonomous component archives behaving like a single integrated database [She90]. The cha...

X-GTRBAC Admin: A Decentralized Administration Model for Enterprise Wide Access Control

by Rafae Bhatti, Basit Shafiq, Elisa Bertino, Arif Ghafoor, James B. D. Joshi - In Proceedings of the Ninth ACM Symposium on Access Control Models And Technologies , 2004
"... The modern enterprise spans several functional units or administrative domains with diverse authorization requirements. Access control policies in an enterprise environment typically express these requirements as authorization constraints. While desirable for access control, constraints can lead to ..."
Abstract - Cited by 24 (10 self) - Add to MetaCart
The modern enterprise spans several functional units or administrative domains with diverse authorization requirements. Access control policies in an enterprise environment typically express these requirements as authorization constraints. While desirable for access control, constraints can lead to conflicts in the overall policy in a multidomain environment. The administration problem for enterprise-wide access control, therefore, not only includes authorization management for users and resources within a single domain but also conflict resolution among heterogeneous access control policies of multiple domains to allow secure interoperation within the enterprise. This work presents design and implementation of X-GTRBAC Admin, an administration model that aims at enabling administration of role-based access control (RBAC) policies in the presence of constraints with support for conflict resolution in a multidomain environment. A key feature of the model is that it allows decentralization of policy administration tasks through the abstraction of administrative domains, which not only simplifies authorization management, but is also fundamental to the concept of decentralized conflict resolution presented. The paper also illustrates the applicability of the outlined administrative concepts in a realistic enterprise environment using an implementation prototype that facilitates policy administration in large enterprises.

Secure collaboration in mediator-free environments

by Mohamed Shehab, Elisa Bertino, Arif Ghafoor - In Proceedings of the 12th ACM Conference on Computer and Communication Security , 2005
"... The internet and related technologies have made multidomain collaborations a reality. Collaboration enables domains to effectively share resources; however it introduces several security and privacy challenges. Managing security in the absence of a central mediator is even more challenging. In this ..."
Abstract - Cited by 14 (1 self) - Add to MetaCart
The internet and related technologies have made multidomain collaborations a reality. Collaboration enables domains to effectively share resources; however it introduces several security and privacy challenges. Managing security in the absence of a central mediator is even more challenging. In this paper, we propose a distributed secure interoperability framework for mediator-free collaboration environments. We introduce the idea of secure access paths which enables domains to make localized access control decisions without having global view of the collaboration. We also present a path authentication technique for proving path authenticity. Furthermore, we present both a proactive and on-demand path discovery algorithms that enable domains to securely discover paths in the collaboration environment.
(Show Context)

Citation Context

...established, security breaches may arise. Secure interoperability in a multidomain environment is a challenging task even in the presence of a trusted mediator managing security of such collaboration =-=[12, 4, 7]-=-. It is much harder to handle security in a fully distributed and dynamic interoperation environment where domains join and leave in an adhoc manner and in the absence of a trusted mediator. However, ...

Privacy-preserving semantic interoperation and access control of heterogeneous databases

by Prasenjit Mitra, Chi-chun Pan, Peng Liu, et al. - IN: PROC. ACM CONF. ON COMPUTER AND COMMUNICATIONS SECURITY , 2006
"... Today, many applications require users from one organization to access data belonging to organizations. While traditional solutions offered for the federated and mediated databases facilitate this by sharing metadata, this may not be acceptable for certain organizations due to privacy concerns. In t ..."
Abstract - Cited by 12 (0 self) - Add to MetaCart
Today, many applications require users from one organization to access data belonging to organizations. While traditional solutions offered for the federated and mediated databases facilitate this by sharing metadata, this may not be acceptable for certain organizations due to privacy concerns. In this paper, we propose a novel solution – Privacy-preserving Access Control Toolkit (PACT) – that enables privacy-preserving secure semantic access control and allows sharing of data among heterogeneous databases without having to share metadata. PACT uses encrypted ontologies, encrypted ontology-mapping tables and conversion functions, encrypted role hierarchies and encrypted queries. The encrypted results of queries are sent directly from the responding system to the requesting system, bypassing the mediator to further improve the security of the system. PACT provides semantic access control using ontologies and semantically expanded authorization tables at the mediator. One of the distinguishing features of the PACT is that it requires very little changes to underlying databases. Despite using encrypted queries and encrypted mediation, we demonstrate that PACT provides acceptable performance.
(Show Context)

Citation Context

...ification and enforcement can be implemented in federated database systems [9]. Dawson, Qian, and Samarati, discuss how security can be provided while enabling interoperation of heterogeneous systems =-=[8]-=-. However, their system does not have provisions to preserve the privacy & confidentiality of the metadata of the information sources. There has been substantial work on querying databases with encryp...

An RBAC framework for time constrained secure interoperation in multi-domain environments

by Smithi Piromruen, James B. D. Joshi - In Proceedings of 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems(WORDS’05 , 2005
"... In emerging e-commerce applications, time constrained information sharing between different systems is becoming a common phenomenon. A flexible and efficient mechanism is needed to support short term time-based sharing policies between transient partners. In particular, the interacting domains need ..."
Abstract - Cited by 7 (0 self) - Add to MetaCart
In emerging e-commerce applications, time constrained information sharing between different systems is becoming a common phenomenon. A flexible and efficient mechanism is needed to support short term time-based sharing policies between transient partners. In particular, the interacting domains need to establish a time-based inter-domain access policy without violating the original time-based security policies of the individual systems. In this paper, we address this issue using the Generalized Temporal Role Based Access Control (GTRBAC) framework. The proposed mechanism involves a system processing an inter-domain access requirement specification to extend or restructure its local GTRBAC policy with proper temporal constraints to allow its external partner domain to access its resources. The transformed local GTRBAC policy facilitates the inter-domain accesses while still conforming to the original local policy requirements. 1.
(Show Context)

Citation Context

...quivalent to the original. Due tosspace limitation, we omit the formal proof.s4. Related WorksSeveral research efforts have been devoted to thestopic of policy composition in multi-domainsenvironment =-=[2, 3, 5]-=-. The problem of securesinteroperation has been addressed in literature in thescontext of multi-level security (MLS) model. [2, 3, 5].sDawson et. al. [3] have discussed a mediator basedsframework for ...

Privacy-preserving schema matching using mutual information

by Isabel F. Cruz, Roberto Tamassia, Danfeng Yao - of Lecture Notes in Computer Science
"... The problem of schema or ontology matching is to define mappings among schema or ontology elements. Such mappings are typically defined between two schemas or two ontologies at a time. Ideally, using the defined mappings, one would be able to issue a single query that will be rewritten automatically ..."
Abstract - Cited by 3 (3 self) - Add to MetaCart
The problem of schema or ontology matching is to define mappings among schema or ontology elements. Such mappings are typically defined between two schemas or two ontologies at a time. Ideally, using the defined mappings, one would be able to issue a single query that will be rewritten automatically to all the databases, instead of manually writing a query to each database. In a centrally mediated architecture a query is written in terms of a global schema or ontology that integrates all the database schemas or ontologies, while in a peer-to-peer architecture a query is written in terms of the schema or of the ontology of any of the peer databases. Automatic schema matching approaches can use only the schema, only the instances, or a combination of both. Mappings can take into account not only concept properties (e.g., string similarity), but also constraints (e.g., relationship cardinality) and schema structure (e.g., graph similarity) [9]. Security and privacy issues arise in the context of data integration. For example, previous work looks into secure access to mediated data [2, 4]. Other work has defined the concept of minimal necessary information sharing that applies to querying: in computing
(Show Context)

Citation Context

...dinality) and schema structure (e.g., graph similarity) [9]. Security and privacy issues arise in the context of data integration. For example, previous work looks into secure access to mediated data =-=[2,4]-=-. Other work has defined the concept of minimal necessary information sharing that applies to querying: in computing the answer to a query, only the query result should be revealed [1]. Most matching ...

A Model for Secure Multimedia Document Database System in a Distributed Environment

by James B. D. Joshi, Student Member, Zhaohui Kevin Li, Husni Fahmi, Basit Shafiq, Arif Ghafoor - IEEE Transaction on Multimedia , 2002
"... The Internet provides a universal platform for largescale distribution of information and supports inter-organizational services, system integration, and collaboration. Use of multimedia documents for dissemination and sharing of massive amounts of information is becoming a common practice for Inter ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
The Internet provides a universal platform for largescale distribution of information and supports inter-organizational services, system integration, and collaboration. Use of multimedia documents for dissemination and sharing of massive amounts of information is becoming a common practice for Internet-based applications and enterprises. With the rapid proliferation of multimedia data management technologies over the Internet, there is growing concern about security and privacy of information. Composing multimedia documents in a distributed heterogeneous environment involves integrating media objects from multiple security domains that may employ different access control policies for media objects. In this paper, we present a security model for distributed document management system that allows creation, storage, indexing, and presentation of secure multimedia documents. The model is based on a time augmented Petri-net and provides a flexible, multilevel access control mechanism that allows clearance-based access to different levels of information in a document. In addition, the model provides detailed multimedia synchronization requirements including deterministic and nondeterministic temporal relations and incomplete timing information among media objects.
(Show Context)

Citation Context

...es a security domain. The security policies may vary within each system and across systems, making the integrated MMIS a complex multidomain environment that raises several crucial security challenge =-=[12]-=-, [17], [21], [36]. There is a growing need for ensuring secure access to individual media components in distributed multimedia applications. For example, in a Web-based distance learning application,...

Access Control Management and Security in Multi-Domain . . .

by Basit Shafiq , 2006
"... ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
Abstract not found

Mediating between Strangers: A Trust Management Based Approach

by Joachim Biskup, Yücel Karabulut - In 2nd Annual PKI Research Workshop , 2003
"... Data sources in i-mediation, following property-based security policies, aim at supporting a wide range of potential clients, which are in general unknown in advance and may belong to heterogeneous and autonomous security domains. This raises the challenge how remote and autonomous entities can ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Data sources in i-mediation, following property-based security policies, aim at supporting a wide range of potential clients, which are in general unknown in advance and may belong to heterogeneous and autonomous security domains. This raises the challenge how remote and autonomous entities can agree on a common understanding of certified properties, and other issues related to these properties (e.g. encoding formats). This paper proposes solutions that are based on secure i-mediation and a hybrid PKI model, which unifies X.509 and SPKI. We present a mediation functionality, called f-mediation. Secure f -mediation assists entities in finding partners for i-mediation and providing them with appropriate certificates and credentials. Thereby, among others, f -mediation deals with delegation and conversion of free properties into capability-like bound properties.
(Show Context)

Citation Context

...in three research areas: secure mediation, certificate/credentialbased access control, and the employment of KQML for implementing PKIbased security architectures. Contributions to secure i-mediation =-=[8, 25, 10]-=- employ either identity-based or security clearance-based authentication and authorization approaches which appear to be less useful for i-mediation scenarios which we consider. To our knowledge, no c...

Security Architecture of the Multimedia Mediator

by Christian Altenschmidt, Joachim Biskup, Yücel Karabulut - Proceedings of the 14th Annual IFIP WG 11.3 Working Conference on Database Security, Schoorl , 2001
"... Mediation is a powerful paradigm for advanced interoperable information systems. The Multimedia Mediator has been designed and implemented as a widely applicable component which can be instantiated for a specific application. This paper presents the architecture of its security module which enforces ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Mediation is a powerful paradigm for advanced interoperable information systems. The Multimedia Mediator has been designed and implemented as a widely applicable component which can be instantiated for a specific application. This paper presents the architecture of its security module which enforces a previously reported approach to secure mediation. In this approach, a user submits cryptographically signed credentials containing both personal authorization attributes and his public encryption key, and data sources decide on the query access on the basis of shown personal authorization attributes and return encrypted answers. The security module uniformly represents the query access authorizations of the sources, controls the intermediate usage of credentials, assists users in submitting appropriate credentials, selects and forwards credentials for subqueries, and exploits credentials for query optimization. The architecture features a layered structure co-existing with the functional layers, enrichments of embeddings (for application objects into proxy objects of source items) with authorization data, a knowledge base for authorizations with credentials as grantees, and qualication and inference procedures for credentials.
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University