A Labelling System for Derived Data Control View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2010

AUTHORS

Enrico Scalavino , Vaibhav Gowadia , Emil C. Lupu

ABSTRACT

Existing ERM/DRM systems and more generally usage control systems aim to control who accesses data and the usage data is subject to even after the data has been disseminated to recipients. However, once the data has been used, no control or protection is applied to the information created as result of the usage. We propose a solution to derive protection requirements for derived data that makes use of Multi-Level Security (MLS) labels to associate data with its protection level and usage functions (transformations) with the protection requirements of the data they can derive. Users are also associated with clearance labels according to their roles. Clearance and data labels are used to determine whether a user can access data as in traditional Mandatory Access Control systems, while labels associated with transformations are used to derive labels for derived data. The solution assumes that the amount of sensitive information flowing from the input to the output of a transformation can be deduced from the input data and the transformation itself, so that adequate protection can be associated with the derived output. More... »

PAGES

65-80

Book

TITLE

Data and Applications Security and Privacy XXIV

ISBN

978-3-642-13738-9
978-3-642-13739-6

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-13739-6_5

DOI

http://dx.doi.org/10.1007/978-3-642-13739-6_5

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1002480956


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information Systems", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Department of Computing, Imperial College London", 
          "id": "http://www.grid.ac/institutes/grid.7445.2", 
          "name": [
            "Department of Computing, Imperial College London"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Scalavino", 
        "givenName": "Enrico", 
        "id": "sg:person.015527627741.84", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015527627741.84"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Computing, Imperial College London", 
          "id": "http://www.grid.ac/institutes/grid.7445.2", 
          "name": [
            "Department of Computing, Imperial College London"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Gowadia", 
        "givenName": "Vaibhav", 
        "id": "sg:person.013405421541.22", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013405421541.22"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Computing, Imperial College London", 
          "id": "http://www.grid.ac/institutes/grid.7445.2", 
          "name": [
            "Department of Computing, Imperial College London"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Lupu", 
        "givenName": "Emil C.", 
        "id": "sg:person.013404167044.28", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013404167044.28"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2010", 
    "datePublishedReg": "2010-01-01", 
    "description": "Existing ERM/DRM systems and more generally usage control systems aim to control who accesses data and the usage data is subject to even after the data has been disseminated to recipients. However, once the data has been used, no control or protection is applied to the information created as result of the usage. We propose a solution to derive protection requirements for derived data that makes use of Multi-Level Security (MLS) labels to associate data with its protection level and usage functions (transformations) with the protection requirements of the data they can derive. Users are also associated with clearance labels according to their roles. Clearance and data labels are used to determine whether a user can access data as in traditional Mandatory Access Control systems, while labels associated with transformations are used to derive labels for derived data. The solution assumes that the amount of sensitive information flowing from the input to the output of a transformation can be deduced from the input data and the transformation itself, so that adequate protection can be associated with the derived output.", 
    "editor": [
      {
        "familyName": "Foresti", 
        "givenName": "Sara", 
        "type": "Person"
      }, 
      {
        "familyName": "Jajodia", 
        "givenName": "Sushil", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-13739-6_5", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-642-13738-9", 
        "978-3-642-13739-6"
      ], 
      "name": "Data and Applications Security and Privacy XXIV", 
      "type": "Book"
    }, 
    "keywords": [
      "mandatory access control system", 
      "usage control systems", 
      "access control system", 
      "protection requirements", 
      "sensitive information", 
      "DRM system", 
      "control system", 
      "data labels", 
      "security labels", 
      "usage data", 
      "data control", 
      "usage functions", 
      "input data", 
      "users", 
      "labels", 
      "protection level", 
      "requirements", 
      "information", 
      "system", 
      "labeling system", 
      "data", 
      "usage", 
      "output", 
      "solution", 
      "input", 
      "transformation", 
      "adequate protection", 
      "protection", 
      "control", 
      "use", 
      "amount", 
      "results", 
      "function", 
      "levels", 
      "role", 
      "recipients", 
      "clearance"
    ], 
    "name": "A Labelling System for Derived Data Control", 
    "pagination": "65-80", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1002480956"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-13739-6_5"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-13739-6_5", 
      "https://app.dimensions.ai/details/publication/pub.1002480956"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-12-01T06:47", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221201/entities/gbq_results/chapter/chapter_149.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-642-13739-6_5"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-13739-6_5'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-13739-6_5'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-13739-6_5'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-13739-6_5'


 

This table displays all metadata directly associated to this object as RDF triples.

115 TRIPLES      22 PREDICATES      62 URIs      55 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-13739-6_5 schema:about anzsrc-for:08
2 anzsrc-for:0806
3 schema:author Ndb92c7799f74443a9093236b09656d43
4 schema:datePublished 2010
5 schema:datePublishedReg 2010-01-01
6 schema:description Existing ERM/DRM systems and more generally usage control systems aim to control who accesses data and the usage data is subject to even after the data has been disseminated to recipients. However, once the data has been used, no control or protection is applied to the information created as result of the usage. We propose a solution to derive protection requirements for derived data that makes use of Multi-Level Security (MLS) labels to associate data with its protection level and usage functions (transformations) with the protection requirements of the data they can derive. Users are also associated with clearance labels according to their roles. Clearance and data labels are used to determine whether a user can access data as in traditional Mandatory Access Control systems, while labels associated with transformations are used to derive labels for derived data. The solution assumes that the amount of sensitive information flowing from the input to the output of a transformation can be deduced from the input data and the transformation itself, so that adequate protection can be associated with the derived output.
7 schema:editor N71346ed3795c4061a8f8184ec1c4dd6b
8 schema:genre chapter
9 schema:isAccessibleForFree true
10 schema:isPartOf Nf97d5cf19a144f7d96140070ac5407a6
11 schema:keywords DRM system
12 access control system
13 adequate protection
14 amount
15 clearance
16 control
17 control system
18 data
19 data control
20 data labels
21 function
22 information
23 input
24 input data
25 labeling system
26 labels
27 levels
28 mandatory access control system
29 output
30 protection
31 protection level
32 protection requirements
33 recipients
34 requirements
35 results
36 role
37 security labels
38 sensitive information
39 solution
40 system
41 transformation
42 usage
43 usage control systems
44 usage data
45 usage functions
46 use
47 users
48 schema:name A Labelling System for Derived Data Control
49 schema:pagination 65-80
50 schema:productId N24638311bc4d485d82eb9d0cb5fe3e0a
51 Nc772dc03b9d746c69229fe3c3e4b554a
52 schema:publisher N11d42e913e094ee59a3e2d36c12b3281
53 schema:sameAs https://app.dimensions.ai/details/publication/pub.1002480956
54 https://doi.org/10.1007/978-3-642-13739-6_5
55 schema:sdDatePublished 2022-12-01T06:47
56 schema:sdLicense https://scigraph.springernature.com/explorer/license/
57 schema:sdPublisher Nf1c37420f34a42599791cc8ffee004d9
58 schema:url https://doi.org/10.1007/978-3-642-13739-6_5
59 sgo:license sg:explorer/license/
60 sgo:sdDataset chapters
61 rdf:type schema:Chapter
62 N11d42e913e094ee59a3e2d36c12b3281 schema:name Springer Nature
63 rdf:type schema:Organisation
64 N24638311bc4d485d82eb9d0cb5fe3e0a schema:name dimensions_id
65 schema:value pub.1002480956
66 rdf:type schema:PropertyValue
67 N6d9625ec10af4da88822b85ba63642e2 rdf:first sg:person.013404167044.28
68 rdf:rest rdf:nil
69 N71346ed3795c4061a8f8184ec1c4dd6b rdf:first Nd283b012766e4398bb3ba1933554dfd8
70 rdf:rest N818a6243053347fd9997979d690923d7
71 N818a6243053347fd9997979d690923d7 rdf:first Nf4e66a8a67544965bd2f8c5527d0f821
72 rdf:rest rdf:nil
73 Nc52c38dbb75d4b30a949215f5fb889ed rdf:first sg:person.013405421541.22
74 rdf:rest N6d9625ec10af4da88822b85ba63642e2
75 Nc772dc03b9d746c69229fe3c3e4b554a schema:name doi
76 schema:value 10.1007/978-3-642-13739-6_5
77 rdf:type schema:PropertyValue
78 Nd283b012766e4398bb3ba1933554dfd8 schema:familyName Foresti
79 schema:givenName Sara
80 rdf:type schema:Person
81 Ndb92c7799f74443a9093236b09656d43 rdf:first sg:person.015527627741.84
82 rdf:rest Nc52c38dbb75d4b30a949215f5fb889ed
83 Nf1c37420f34a42599791cc8ffee004d9 schema:name Springer Nature - SN SciGraph project
84 rdf:type schema:Organization
85 Nf4e66a8a67544965bd2f8c5527d0f821 schema:familyName Jajodia
86 schema:givenName Sushil
87 rdf:type schema:Person
88 Nf97d5cf19a144f7d96140070ac5407a6 schema:isbn 978-3-642-13738-9
89 978-3-642-13739-6
90 schema:name Data and Applications Security and Privacy XXIV
91 rdf:type schema:Book
92 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
93 schema:name Information and Computing Sciences
94 rdf:type schema:DefinedTerm
95 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
96 schema:name Information Systems
97 rdf:type schema:DefinedTerm
98 sg:person.013404167044.28 schema:affiliation grid-institutes:grid.7445.2
99 schema:familyName Lupu
100 schema:givenName Emil C.
101 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013404167044.28
102 rdf:type schema:Person
103 sg:person.013405421541.22 schema:affiliation grid-institutes:grid.7445.2
104 schema:familyName Gowadia
105 schema:givenName Vaibhav
106 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013405421541.22
107 rdf:type schema:Person
108 sg:person.015527627741.84 schema:affiliation grid-institutes:grid.7445.2
109 schema:familyName Scalavino
110 schema:givenName Enrico
111 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015527627741.84
112 rdf:type schema:Person
113 grid-institutes:grid.7445.2 schema:alternateName Department of Computing, Imperial College London
114 schema:name Department of Computing, Imperial College London
115 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...