Catálogo de publicaciones - libros

Compartir en
redes sociales


Trust, Privacy and Security in Digital Business: 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007. Proceedings

Costas Lambrinoudakis ; Günther Pernul ; A Min Tjoa (eds.)

En conferencia: 4º International Conference on Trust, Privacy and Security in Digital Business (TrustBus) . Regensburg, Germany . September 3, 2007 - September 7, 2007

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Computers and Society; Management of Computing and Information Systems; Data Encryption; Computer Communication Networks; Systems and Data Security; IT in Business

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2007 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-3-540-74408-5

ISBN electrónico

978-3-540-74409-2

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag Berlin Heidelberg 2007

Tabla de contenidos

Usage Control in Service-Oriented Architectures

Alexander Pretschner; Fabio Massacci; Manuel Hilty

Usage control governs the handling of sensitive data after it has been given away. The enforcement of usage control requirements is a challenge because the service requester in general has no control over the service provider’s information processing devices. We analyze applicable trust models, conclude that observation-based enforcement is often more appropriate than enforcement by direct control over the service provider’s actions, and present a logical architecture that blends both forms of enforcement with the business logics of service-oriented architectures.

- Session 3: Identity Management and Usage Control | Pp. 83-93

On Device-Based Identity Management in Enterprises

Marco Casassa Mont; Boris Balacheff

This paper focuses on the management of device-based identities within enterprises. This is a key requirement in enterprises where the identities of devices have become as important as the identities of humans (users) to grant access to enterprise resources. In this context, access control systems need to understand which devices are being used to access resources, by whom and in which contexts. Trust in managed devices’ identities is an important first step to enable this. Most related commercial solutions are deployed at the network level. Instead, we focus at the application/service level to leverage current enterprise identity management solutions, used to manage users’ identities. We investigate requirements and related issues. We introduce an initial approach and describe our related solution. A working prototype (proof-of concept) has been fully implemented by extending HP OpenView Identity Management solutions and using trusted computing-enabled devices. This is work in progress: we aim at setting the context and discussing our current status and next steps.

- Session 3: Identity Management and Usage Control | Pp. 94-103

Analysis-Level Classes from Secure Business Processes Through Model Transformations

Alfonso Rodríguez; Eduardo Fernández-Medina; Mario Piattini

Nowadays, business processes (BP) are important in the maintenance of competitiveness within enterprises. Moreover, security is a crucial issue in business performance. In the last few years, the languages used for BP representation have been improved and new notations have appeared. Proposals for security requirement specifications at this high level of abstraction have also appeared. Nevertheless, these models have not been transformed into concrete models that can be used in a software development process. In our proposal, we will obtain analysis-level classes from a business process specification in which security requirements are included. Model transformations are within the scope of MDA and they are specified by using the QVT standard. Finally, we shall apply this approach to a typical health-care business process.

- Session 3: Identity Management and Usage Control | Pp. 104-114

A Trust and Context Aware Access Control Model for Web Services Conversations

Marijke Coetzee; J. H. P. Eloff

The design of effective access control models, to meet the unique challenges posed by the web services paradigm, is a current research focus. Despite recent advances in this field, solutions are generally limited to controlling access to single operations of request-response nature. To ensure that a service is used appropriately, message exchanges can be grouped into conversations consisting of related messages that are governed by sequence constraints. Towards addressing the security of message exchanges, this paper describes an access control model for web services conversations. A trust and context aware access control model is presented that promotes the seamless execution of operations contained by web services conversations.

- Session 4: Authentication and Access Control | Pp. 115-124

Design and Implementation of Distributed Access Control Infrastructures for Federations of Autonomous Domains

Petros Belsis; Stefanos Gritzalis; Christos Skourlas; Vassillis Tsoukalas

Federations of autonomous domains allow resource sharing in a highly dynamic manner, improving organizational response times and facilitating cooperation between different information systems. To accomplish this, it is essential to provide a scalable and flexible mechanism that allows security management and acts at application level independently of operating system or platform. In this paper we present a scalable solution that enables interoperation between different systems participating in a dynamic federation, while it also allows the participating systems to retain their autonomy; we present the software architecture of this distributed access control enforcement mechanism and describe our implementation choices.

- Session 4: Authentication and Access Control | Pp. 125-134

On Device Authentication in Wireless Networks: Present Issues and Future Challenges

Georgios Kambourakis; Stefanos Gritzalis

Whilst device authentication must be considered as a cardinal security issue, complementary and of equal importance to user authentication, in today’s wireless networks, only a few papers address it patchily. This paper identifies and analyses possible major solutions towards solving the device authentication problem. We discuss key issues and future challenges that characterize each solution examining its pros and cons. We also offer a short qualitative comparative analysis for the device authentication schemes in question, examining its applicability for both infrastructure and ad-hoc deployments.

- Session 4: Authentication and Access Control | Pp. 135-144

The Meaning of Logs

Sandro Etalle; Fabio Massacci; Artsiom Yautsiukhin

While logging events is becoming increasingly common in computing, in communication and in collaborative environments, log systems need to satisfy increasingly challenging (if not conflicting) requirements. In this paper we propose a high-level framework for modeling log systems, and reasoning about them. This framework allows one to give a high-level representation of a log system and to check whether it satisfies given audit and privacy properties which in turn can be expressed in standard logic. In particular, the framework can be used for comparing and assessing log systems. We validate our proposal by formalizing a number of standard log properties and by using it to review a number of existing systems. Despite the growing pervasiveness of log systems, we believe this is the first framework of this sort.

- Session 5: Compliance and User Privacy | Pp. 145-154

Data Protection and Privacy Laws in the Light of RFID and Emerging Technologies

Gerald Quirchmayr; Christopher C. Wills

This paper investigates the effect of new technologies and new systems on data protection and privacy. It attempts to give an overview of the major issues resulting form the introduction of new systems, mainly those based on RFID and ubiquitous/pervasive computing technology and discusses the consequences of increased efficiency and improved security in relation to privacy protection. Most of the legally-oriented analysis carried out in this paper is primarily grounded in the current European data and privacy protection legislation.

- Session 5: Compliance and User Privacy | Pp. 155-164

Consistency of User Attribute in Federated Systems

Quan Pham; Adrian McCullagh; Ed Dawson

In a federated system, it is not uncommon for a user profile registered to a particular system to contain enough attributes to request services from that system. Other attributes may be missing from that profile when services are requested from another system. The problem is that currently, when a change in user attributes happens, it is very difficult for the federation to incorporate the changes in order to resolve the conflict of attributes and maintain the consistency of attributes of users between different systems. Currently ready-for-deploy systems such as Liberty Alliance, Microsoft Windows CardSpace (formerly InfoCard) and Shibboleth do not address this issue efficiently. In general, consistency issues of user attributes in federated system via a 2-dimentional view: consistency between member systems (horizontal consistency) and consistency between federation and local system (vertical consistency). In this paper, we discuss the issue of horizontal consistency to achieve better interoperability and fine-granularity for access control decisions in a federated system by analysing the two approaches to achieve the consistency of user attributes: attribute synchronisation and delegation.

- Session 5: Compliance and User Privacy | Pp. 165-177

Pre-execution Security Policy Assessment of Remotely Defined BPEL-Based Grid Processes

Klaus-Peter Fischer; Udo Bleimann; Steven Furnell

In this paper results from research on security policy enforcement for cross-domain defined business processes specified in BPEL are transferred to the field of Grid computing, where BPEL is used to define Grid processes. In order to facilitate the assessment of remotely defined BPEL-based Grid processes for compliance with security policies prior to execution, a method for specifying security policies with respect to security-relevant semantic patterns in BPEL is applied. The paper shows the extent to which transfer of the former results was successful and indicates limitations and areas of further research. Where the situation is similar to cooperative business processes, such as in forming dynamic virtual organizations using Grid technology, the results turned out to be transferable with minor modifications, whereas for a transfer to the Grid context in general further investigation is required (in particular with respect to formal specification of security-relevant semantics of Grid services).

- Session 6: Policy Management | Pp. 178-189