Rule Enforcement with Third Parties in Secure Cooperative Data Access

  • Meixing Le
  • Krishna Kant
  • Sushil Jajodia
Conference paper

DOI: 10.1007/978-3-642-39256-6_20

Volume 7964 of the book series Lecture Notes in Computer Science (LNCS)
Cite this paper as:
Le M., Kant K., Jajodia S. (2013) Rule Enforcement with Third Parties in Secure Cooperative Data Access. In: Wang L., Shafiq B. (eds) Data and Applications Security and Privacy XXVII. DBSec 2013. Lecture Notes in Computer Science, vol 7964. Springer, Berlin, Heidelberg

Abstract

In this paper, we consider the scenario where a set of parties need to cooperate with one another. To safely exchange the information, a set of authorization rules is given to the parties. In some cases, a trusted third party is required to perform the expected operations. Since interactions with the third party can be expensive and there maybe risk of data exposure/misuse, it is important to minimize their use. We formulate the minimization problem and show the problem is in NP-hard. We then propose a greedy algorithm to find close to optimal solutions.

Keywords

Authorization rule Trusted third party Join Path 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© IFIP International Federation for Information Processing 2013

Authors and Affiliations

  • Meixing Le
    • 1
  • Krishna Kant
    • 1
  • Sushil Jajodia
    • 1
  1. 1.George Mason UniversityFairfaxUSA