A metadata model for data centric security

Benjmin Aziz*, Shirley Crompton, Michael Wilson

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Data-sharing agreements across organisations are often used to derive security policies to enforce the access, usage and routing or data across different trust and administrative domains. The data exchanged is usually annotated with metadata to describe its meaning in different applications and contexts, which may be used by the enforcement points of such data-sharing policies. In this paper, we present a metadata model for describing data-centric security, i.e. any security information that may be used to annotate data. Such metadata may be used to describe attributes of the data as well as their security requirements. We demonstrate an applicability scenario of our model in the context of organisations sharing scientific data.

Original languageEnglish
Title of host publicationSecure and Trust Computing, Data Management, and Applications - 8th FTRA International Conference, STA 2011, Proceedings
Pages21-28
Number of pages8
DOIs
Publication statusPublished - 14 Jul 2011
Event8th FTRA International Conference on Secure and Trust Computing, Data Management, and Application - Loutraki, Greece
Duration: 28 Jun 201130 Jun 2011

Publication series

NameCommunications in Computer and Information Science
Volume186 CCIS
ISSN (Print)1865-0929

Conference

Conference8th FTRA International Conference on Secure and Trust Computing, Data Management, and Application
Abbreviated titleSTA 2011
Country/TerritoryGreece
CityLoutraki
Period28/06/1130/06/11

Keywords

  • Data Sharing
  • Legal Contracts
  • Metadata
  • Security
  • Semantic Web

Fingerprint

Dive into the research topics of 'A metadata model for data centric security'. Together they form a unique fingerprint.

Cite this