A Labelling System for Derived Data Control View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2010

AUTHORS

Enrico Scalavino , Vaibhav Gowadia , Emil C. Lupu

ABSTRACT

Existing ERM/DRM systems and more generally usage control systems aim to control who accesses data and the usage data is subject to even after the data has been disseminated to recipients. However, once the data has been used, no control or protection is applied to the information created as result of the usage. We propose a solution to derive protection requirements for derived data that makes use of Multi-Level Security (MLS) labels to associate data with its protection level and usage functions (transformations) with the protection requirements of the data they can derive. Users are also associated with clearance labels according to their roles. Clearance and data labels are used to determine whether a user can access data as in traditional Mandatory Access Control systems, while labels associated with transformations are used to derive labels for derived data. The solution assumes that the amount of sensitive information flowing from the input to the output of a transformation can be deduced from the input data and the transformation itself, so that adequate protection can be associated with the derived output. More... »

PAGES

65-80

Book

TITLE

Data and Applications Security and Privacy XXIV

ISBN

978-3-642-13738-9
978-3-642-13739-6

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-13739-6_5

DOI

http://dx.doi.org/10.1007/978-3-642-13739-6_5

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1002480956


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information Systems", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Department of Computing, Imperial College London", 
          "id": "http://www.grid.ac/institutes/grid.7445.2", 
          "name": [
            "Department of Computing, Imperial College London"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Scalavino", 
        "givenName": "Enrico", 
        "id": "sg:person.015527627741.84", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015527627741.84"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Computing, Imperial College London", 
          "id": "http://www.grid.ac/institutes/grid.7445.2", 
          "name": [
            "Department of Computing, Imperial College London"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Gowadia", 
        "givenName": "Vaibhav", 
        "id": "sg:person.013405421541.22", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013405421541.22"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Computing, Imperial College London", 
          "id": "http://www.grid.ac/institutes/grid.7445.2", 
          "name": [
            "Department of Computing, Imperial College London"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Lupu", 
        "givenName": "Emil C.", 
        "id": "sg:person.013404167044.28", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013404167044.28"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2010", 
    "datePublishedReg": "2010-01-01", 
    "description": "Existing ERM/DRM systems and more generally usage control systems aim to control who accesses data and the usage data is subject to even after the data has been disseminated to recipients. However, once the data has been used, no control or protection is applied to the information created as result of the usage. We propose a solution to derive protection requirements for derived data that makes use of Multi-Level Security (MLS) labels to associate data with its protection level and usage functions (transformations) with the protection requirements of the data they can derive. Users are also associated with clearance labels according to their roles. Clearance and data labels are used to determine whether a user can access data as in traditional Mandatory Access Control systems, while labels associated with transformations are used to derive labels for derived data. The solution assumes that the amount of sensitive information flowing from the input to the output of a transformation can be deduced from the input data and the transformation itself, so that adequate protection can be associated with the derived output.", 
    "editor": [
      {
        "familyName": "Foresti", 
        "givenName": "Sara", 
        "type": "Person"
      }, 
      {
        "familyName": "Jajodia", 
        "givenName": "Sushil", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-13739-6_5", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-642-13738-9", 
        "978-3-642-13739-6"
      ], 
      "name": "Data and Applications Security and Privacy XXIV", 
      "type": "Book"
    }, 
    "keywords": [
      "mandatory access control system", 
      "usage control systems", 
      "access control system", 
      "protection requirements", 
      "sensitive information", 
      "DRM system", 
      "control system", 
      "data labels", 
      "security labels", 
      "usage data", 
      "data control", 
      "usage functions", 
      "input data", 
      "users", 
      "labels", 
      "protection level", 
      "requirements", 
      "information", 
      "system", 
      "labeling system", 
      "data", 
      "usage", 
      "output", 
      "solution", 
      "input", 
      "transformation", 
      "adequate protection", 
      "protection", 
      "control", 
      "use", 
      "amount", 
      "results", 
      "function", 
      "levels", 
      "role", 
      "recipients", 
      "clearance"
    ], 
    "name": "A Labelling System for Derived Data Control", 
    "pagination": "65-80", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1002480956"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-13739-6_5"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-13739-6_5", 
      "https://app.dimensions.ai/details/publication/pub.1002480956"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-10-01T06:52", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221001/entities/gbq_results/chapter/chapter_120.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-642-13739-6_5"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-13739-6_5'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-13739-6_5'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-13739-6_5'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-13739-6_5'


 

This table displays all metadata directly associated to this object as RDF triples.

115 TRIPLES      22 PREDICATES      62 URIs      55 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-13739-6_5 schema:about anzsrc-for:08
2 anzsrc-for:0806
3 schema:author Nae65425d97c44faca56ddecd7c76e1eb
4 schema:datePublished 2010
5 schema:datePublishedReg 2010-01-01
6 schema:description Existing ERM/DRM systems and more generally usage control systems aim to control who accesses data and the usage data is subject to even after the data has been disseminated to recipients. However, once the data has been used, no control or protection is applied to the information created as result of the usage. We propose a solution to derive protection requirements for derived data that makes use of Multi-Level Security (MLS) labels to associate data with its protection level and usage functions (transformations) with the protection requirements of the data they can derive. Users are also associated with clearance labels according to their roles. Clearance and data labels are used to determine whether a user can access data as in traditional Mandatory Access Control systems, while labels associated with transformations are used to derive labels for derived data. The solution assumes that the amount of sensitive information flowing from the input to the output of a transformation can be deduced from the input data and the transformation itself, so that adequate protection can be associated with the derived output.
7 schema:editor N241333bba3f74c4dbf45d27cb37ce407
8 schema:genre chapter
9 schema:isAccessibleForFree true
10 schema:isPartOf N043dafa16f524824b29c960c7f8ffd69
11 schema:keywords DRM system
12 access control system
13 adequate protection
14 amount
15 clearance
16 control
17 control system
18 data
19 data control
20 data labels
21 function
22 information
23 input
24 input data
25 labeling system
26 labels
27 levels
28 mandatory access control system
29 output
30 protection
31 protection level
32 protection requirements
33 recipients
34 requirements
35 results
36 role
37 security labels
38 sensitive information
39 solution
40 system
41 transformation
42 usage
43 usage control systems
44 usage data
45 usage functions
46 use
47 users
48 schema:name A Labelling System for Derived Data Control
49 schema:pagination 65-80
50 schema:productId Nb901d47d97e74aa69c513abe67a9f1e8
51 Ncbe66e0eece743bcb84d4048469c5453
52 schema:publisher Nd06cb48893af4ace92567678e5a4e6bc
53 schema:sameAs https://app.dimensions.ai/details/publication/pub.1002480956
54 https://doi.org/10.1007/978-3-642-13739-6_5
55 schema:sdDatePublished 2022-10-01T06:52
56 schema:sdLicense https://scigraph.springernature.com/explorer/license/
57 schema:sdPublisher Nd4d74c28316345b798fe35dbe25924ff
58 schema:url https://doi.org/10.1007/978-3-642-13739-6_5
59 sgo:license sg:explorer/license/
60 sgo:sdDataset chapters
61 rdf:type schema:Chapter
62 N043dafa16f524824b29c960c7f8ffd69 schema:isbn 978-3-642-13738-9
63 978-3-642-13739-6
64 schema:name Data and Applications Security and Privacy XXIV
65 rdf:type schema:Book
66 N241333bba3f74c4dbf45d27cb37ce407 rdf:first N95a32d8cd5b14d2eb9e1b0d920b026b3
67 rdf:rest Nd5ebc5c1bf5e43049178259d761e3d33
68 N903d4c9117a74584bb89b457bbb05b7b rdf:first sg:person.013405421541.22
69 rdf:rest Nd5cc40f093eb4533969c2d379159d7cc
70 N95a32d8cd5b14d2eb9e1b0d920b026b3 schema:familyName Foresti
71 schema:givenName Sara
72 rdf:type schema:Person
73 Na7ceba3702d845519f537ac080143427 schema:familyName Jajodia
74 schema:givenName Sushil
75 rdf:type schema:Person
76 Nae65425d97c44faca56ddecd7c76e1eb rdf:first sg:person.015527627741.84
77 rdf:rest N903d4c9117a74584bb89b457bbb05b7b
78 Nb901d47d97e74aa69c513abe67a9f1e8 schema:name doi
79 schema:value 10.1007/978-3-642-13739-6_5
80 rdf:type schema:PropertyValue
81 Ncbe66e0eece743bcb84d4048469c5453 schema:name dimensions_id
82 schema:value pub.1002480956
83 rdf:type schema:PropertyValue
84 Nd06cb48893af4ace92567678e5a4e6bc schema:name Springer Nature
85 rdf:type schema:Organisation
86 Nd4d74c28316345b798fe35dbe25924ff schema:name Springer Nature - SN SciGraph project
87 rdf:type schema:Organization
88 Nd5cc40f093eb4533969c2d379159d7cc rdf:first sg:person.013404167044.28
89 rdf:rest rdf:nil
90 Nd5ebc5c1bf5e43049178259d761e3d33 rdf:first Na7ceba3702d845519f537ac080143427
91 rdf:rest rdf:nil
92 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
93 schema:name Information and Computing Sciences
94 rdf:type schema:DefinedTerm
95 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
96 schema:name Information Systems
97 rdf:type schema:DefinedTerm
98 sg:person.013404167044.28 schema:affiliation grid-institutes:grid.7445.2
99 schema:familyName Lupu
100 schema:givenName Emil C.
101 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013404167044.28
102 rdf:type schema:Person
103 sg:person.013405421541.22 schema:affiliation grid-institutes:grid.7445.2
104 schema:familyName Gowadia
105 schema:givenName Vaibhav
106 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013405421541.22
107 rdf:type schema:Person
108 sg:person.015527627741.84 schema:affiliation grid-institutes:grid.7445.2
109 schema:familyName Scalavino
110 schema:givenName Enrico
111 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015527627741.84
112 rdf:type schema:Person
113 grid-institutes:grid.7445.2 schema:alternateName Department of Computing, Imperial College London
114 schema:name Department of Computing, Imperial College London
115 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...