Towards an Integrated Embedded Fine-Grained Information Protection Framework

To protect the security and privacy of sensitive digital information, it is often necessary to employ a variety of security mechanisms such as encryption, integrity control, authentication, and access control. This paper describes a framework that extends eXtensible Access Control Markup Language (XACML) for use as a container for embedding access control policy with the digital content in the same XACML document. The digital content can be further divided into multiple parts, each of which is encapsulated by its own access control policy. This integrated XACML policy and content document is further protected by using XML Encryption (XML-ENC) and XML Signature (XML-DSIG) mechanisms, as well as XML Key Management Specification (XKMS) for leveraging Public Key Infrastructure (PKI), all in support of the embedded and fine-grained structure. This framework and associated security mechanisms are designed primarily to facilitate the protection and sharing of sensitive information in transit and at rest, within and across organizational boundaries. This paper also describes a prototype implementation of the framework for feasibility study purpose.

[1]  Elisa Bertino,et al.  Security for Web Services and Service-Oriented Architectures , 2009 .

[2]  Kirill Levchenko Multilevel Security , 2009, Encyclopedia of Database Systems.

[3]  Lisa M. Marvel,et al.  Integrated mandatory access control for digital data , 2008, SPIE Defense + Commercial Sensing.

[4]  Edgar R. Weippl,et al.  XML security - A comparative literature review , 2008, J. Syst. Softw..

[5]  Bhavani M. Thuraisingham,et al.  Assured Information Sharing: Technologies, Challenges and Directions , 2008, Intelligence and Security Informatics.

[6]  George Hsieh,et al.  Supporting Secure Embedded Access Control Policy with XACML+XML Security , 2010, 2010 5th International Conference on Future Information Technology.

[7]  Lisa M. Marvel,et al.  Using XACML for Embedded and Fine-Grained Access Control Policy , 2009, 2009 International Conference on Availability, Reliability and Security.

[8]  George Wilson,et al.  Extending Linux for Multi-Level Security , 2007 .