Controlling Data Dissemination

We present a policy-based approach for the control of information flow between services. The controlled dissemination of information shared between services is achieved by the communication and enforcement of policies associated with shared information. The presented approach integrates easily as a communication middle-ware in existing service-based information systems keeping the management and distribution of policies transparent to the service implementation. This article focuses on the architecture and presents initial results that show the feasibility of the approach.

[1]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[2]  Ernesto Damiani,et al.  A reputation-based approach for choosing reliable resources in peer-to-peer networks , 2002, CCS '02.

[3]  Tharam S. Dillon,et al.  On the Move to Meaningful Internet Systems, OTM 2010 , 2010, Lecture Notes in Computer Science.

[4]  Janusz Górski,et al.  Context Sensitive Privacy Management in a Distributed Environment , 2010, OTM Conferences.

[5]  Abdelilah Essiari,et al.  PKI-based security for peer-to-peer information sharing , 2004 .

[6]  Laurent Bussard,et al.  A Practical Generic Privacy Language , 2010, ICISS.

[7]  Sabrina De Capitani di Vimercati,et al.  A privacy-aware access control system , 2008, J. Comput. Secur..

[8]  Meng Li,et al.  Stream Operators for Querying Data Streams , 2005, WAIM.

[9]  Fei Xing,et al.  Understanding Dynamic Denial of Service Attacks in Mobile Ad Hoc Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[10]  Fillia Makedon,et al.  Collaborative automated trust negotiation in peer-to-peer systems , 2004 .

[11]  Sabrina De Capitani di Vimercati,et al.  Guest Editorial: Special Issue on Computer and Communications Security , 2008, TSEC.

[12]  Beng Chin Ooi,et al.  Managing Trust in Peer-to-Peer Systems Using Reputation-Based Techniques , 2003, WAIM.

[13]  Kenneth G. Paterson,et al.  Trusted computing: providing security for peer-to-peer networks , 2005, Fifth IEEE International Conference on Peer-to-Peer Computing (P2P'05).

[14]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[15]  Helge Janicke,et al.  A Property Based Framework for Trust and Reputation in Mobile Computing , 2009, 2009 International Conference on Advanced Information Networking and Applications Workshops.