Skip to content
Back to outputs

A metadata model for data centric security

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Standard

A metadata model for data centric security. / Aziz, Benjmin; Crompton, Shirley; Wilson, Michael.

Secure and Trust Computing, Data Management, and Applications - 8th FTRA International Conference, STA 2011, Proceedings. 2011. p. 21-28 (Communications in Computer and Information Science; Vol. 186 CCIS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Harvard

Aziz, B, Crompton, S & Wilson, M 2011, A metadata model for data centric security. in Secure and Trust Computing, Data Management, and Applications - 8th FTRA International Conference, STA 2011, Proceedings. Communications in Computer and Information Science, vol. 186 CCIS, pp. 21-28, 8th FTRA International Conference on Secure and Trust Computing, Data Management, and Application, Loutraki, Greece, 28/06/11. https://doi.org/10.1007/978-3-642-22339-6_3

APA

Aziz, B., Crompton, S., & Wilson, M. (2011). A metadata model for data centric security. In Secure and Trust Computing, Data Management, and Applications - 8th FTRA International Conference, STA 2011, Proceedings (pp. 21-28). (Communications in Computer and Information Science; Vol. 186 CCIS). https://doi.org/10.1007/978-3-642-22339-6_3

Vancouver

Aziz B, Crompton S, Wilson M. A metadata model for data centric security. In Secure and Trust Computing, Data Management, and Applications - 8th FTRA International Conference, STA 2011, Proceedings. 2011. p. 21-28. (Communications in Computer and Information Science). https://doi.org/10.1007/978-3-642-22339-6_3

Author

Aziz, Benjmin ; Crompton, Shirley ; Wilson, Michael. / A metadata model for data centric security. Secure and Trust Computing, Data Management, and Applications - 8th FTRA International Conference, STA 2011, Proceedings. 2011. pp. 21-28 (Communications in Computer and Information Science).

Bibtex

@inproceedings{0f64caedc4734b2c87ab494129d7d978,
title = "A metadata model for data centric security",
abstract = "Data-sharing agreements across organisations are often used to derive security policies to enforce the access, usage and routing or data across different trust and administrative domains. The data exchanged is usually annotated with metadata to describe its meaning in different applications and contexts, which may be used by the enforcement points of such data-sharing policies. In this paper, we present a metadata model for describing data-centric security, i.e. any security information that may be used to annotate data. Such metadata may be used to describe attributes of the data as well as their security requirements. We demonstrate an applicability scenario of our model in the context of organisations sharing scientific data.",
keywords = "Data Sharing, Legal Contracts, Metadata, Security, Semantic Web",
author = "Benjmin Aziz and Shirley Crompton and Michael Wilson",
year = "2011",
month = jul,
day = "14",
doi = "10.1007/978-3-642-22339-6_3",
language = "English",
isbn = "9783642223389",
series = "Communications in Computer and Information Science",
pages = "21--28",
booktitle = "Secure and Trust Computing, Data Management, and Applications - 8th FTRA International Conference, STA 2011, Proceedings",
note = "8th FTRA International Conference on Secure and Trust Computing, Data Management, and Application, STA 2011 ; Conference date: 28-06-2011 Through 30-06-2011",

}

RIS

TY - GEN

T1 - A metadata model for data centric security

AU - Aziz, Benjmin

AU - Crompton, Shirley

AU - Wilson, Michael

PY - 2011/7/14

Y1 - 2011/7/14

N2 - Data-sharing agreements across organisations are often used to derive security policies to enforce the access, usage and routing or data across different trust and administrative domains. The data exchanged is usually annotated with metadata to describe its meaning in different applications and contexts, which may be used by the enforcement points of such data-sharing policies. In this paper, we present a metadata model for describing data-centric security, i.e. any security information that may be used to annotate data. Such metadata may be used to describe attributes of the data as well as their security requirements. We demonstrate an applicability scenario of our model in the context of organisations sharing scientific data.

AB - Data-sharing agreements across organisations are often used to derive security policies to enforce the access, usage and routing or data across different trust and administrative domains. The data exchanged is usually annotated with metadata to describe its meaning in different applications and contexts, which may be used by the enforcement points of such data-sharing policies. In this paper, we present a metadata model for describing data-centric security, i.e. any security information that may be used to annotate data. Such metadata may be used to describe attributes of the data as well as their security requirements. We demonstrate an applicability scenario of our model in the context of organisations sharing scientific data.

KW - Data Sharing

KW - Legal Contracts

KW - Metadata

KW - Security

KW - Semantic Web

UR - http://www.scopus.com/inward/record.url?scp=79960144647&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-22339-6_3

DO - 10.1007/978-3-642-22339-6_3

M3 - Conference contribution

AN - SCOPUS:79960144647

SN - 9783642223389

T3 - Communications in Computer and Information Science

SP - 21

EP - 28

BT - Secure and Trust Computing, Data Management, and Applications - 8th FTRA International Conference, STA 2011, Proceedings

T2 - 8th FTRA International Conference on Secure and Trust Computing, Data Management, and Application

Y2 - 28 June 2011 through 30 June 2011

ER -

ID: 11459397