A policy framework for data fusion and derived data control

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

10 Citations (Scopus)
1 Downloads (Pure)

Abstract

Recent years have seen an exponential growth of the collection and processing of data from heterogeneous sources for a variety of purposes. Several methods and techniques have been proposed to transform and fuse data into \useful" information. However, the security aspects concerning the fusion of sensitive data are often overlooked. This paper investigates the problem of data fusion and derived data control. In particular, we identify the requirements for regulating the fusion process and eliciting restrictions on the access and usage of derived data. Based on these requirements, we propose an attribute-based policy framework to control the fusion of data from di erent information sources and under the control of di erent authorities. The framework comprises two types of policies: access control policies, which define the authorizations governing the resources used in the fusion process, and fusion policies, which define constraints on allowed fusion processes. We also discuss how such policies can be obtained for derived data.

Original languageEnglish
Title of host publicationABAC '16 Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control
Place of PublicationNew York
PublisherAssociation for Computing Machinery, Inc
Pages47-57
Number of pages11
ISBN (Print)9781450340793
DOIs
Publication statusPublished - 11 Mar 2016
Event2016 ACM International Workshop on Attribute Based Access Control (ABAC 2016) - New Orleans, United States
Duration: 11 Mar 2016 → …

Conference

Conference2016 ACM International Workshop on Attribute Based Access Control (ABAC 2016)
Abbreviated titleABBAC 2016
CountryUnited States
CityNew Orleans
Period11/03/16 → …

Keywords

  • Access control
  • Data fusion
  • Usage control

Fingerprint

Dive into the research topics of 'A policy framework for data fusion and derived data control'. Together they form a unique fingerprint.

Cite this