Data and Applications Security and Privacy XXVII

Volume 7964 of the series Lecture Notes in Computer Science pp 282-288

Rule Enforcement with Third Parties in Secure Cooperative Data Access

  • Meixing LeAffiliated withGeorge Mason University
  • , Krishna KantAffiliated withGeorge Mason University
  • , Sushil JajodiaAffiliated withGeorge Mason University

* Final gross prices may vary according to local VAT.

Get Access


In this paper, we consider the scenario where a set of parties need to cooperate with one another. To safely exchange the information, a set of authorization rules is given to the parties. In some cases, a trusted third party is required to perform the expected operations. Since interactions with the third party can be expensive and there maybe risk of data exposure/misuse, it is important to minimize their use. We formulate the minimization problem and show the problem is in NP-hard. We then propose a greedy algorithm to find close to optimal solutions.


Authorization rule Trusted third party Join Path