5 Search Results for "Winslett, Marianne"


Document
10141 Abstracts Collection – Distributed Usage Control

Authors: Sandro Etalle, Alexander Pretschner, Ravi S. Sandhu, and Marianne Winslett

Published in: Dagstuhl Seminar Proceedings, Volume 10141, Distributed Usage Control (2010)


Abstract
From 06.04. to 09.04.2010, the Dagstuhl Seminar 10141 ``Distributed Usage Control '' was held in Schloss Dagstuhl~--~Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put together in this paper. The first section describes the seminar topics and goals in general. Links to extended abstracts or full papers are provided, if available.

Cite as

Sandro Etalle, Alexander Pretschner, Ravi S. Sandhu, and Marianne Winslett. 10141 Abstracts Collection – Distributed Usage Control. In Distributed Usage Control. Dagstuhl Seminar Proceedings, Volume 10141, pp. 1-12, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2010)


Copy BibTex To Clipboard

@InProceedings{etalle_et_al:DagSemProc.10141.1,
  author =	{Etalle, Sandro and Pretschner, Alexander and Sandhu, Ravi S. and Winslett, Marianne},
  title =	{{10141 Abstracts Collection – Distributed Usage Control}},
  booktitle =	{Distributed Usage Control},
  pages =	{1--12},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2010},
  volume =	{10141},
  editor =	{Sandro Etalle and Alexander Pretschner and Raiv S. Sandhu and Marianne Winslett},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.10141.1},
  URN =		{urn:nbn:de:0030-drops-27185},
  doi =		{10.4230/DagSemProc.10141.1},
  annote =	{Keywords: Usage control, access control, data protection, privacy, security policies, trust, trusted computing, compliance, DRM, information flow}
}
Document
10141 Summary – Distributed Usage Control

Authors: Sandro Etalle, Alexander Pretschner, Ravi S. Sandhu, and Marianne Winslett

Published in: Dagstuhl Seminar Proceedings, Volume 10141, Distributed Usage Control (2010)


Abstract
We summarize Dagstuhl seminar 10141 on Distributed Usage Control.

Cite as

Sandro Etalle, Alexander Pretschner, Ravi S. Sandhu, and Marianne Winslett. 10141 Summary – Distributed Usage Control. In Distributed Usage Control. Dagstuhl Seminar Proceedings, Volume 10141, pp. 1-4, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2010)


Copy BibTex To Clipboard

@InProceedings{etalle_et_al:DagSemProc.10141.2,
  author =	{Etalle, Sandro and Pretschner, Alexander and Sandhu, Ravi S. and Winslett, Marianne},
  title =	{{10141 Summary – Distributed Usage Control}},
  booktitle =	{Distributed Usage Control},
  pages =	{1--4},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2010},
  volume =	{10141},
  editor =	{Sandro Etalle and Alexander Pretschner and Raiv S. Sandhu and Marianne Winslett},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.10141.2},
  URN =		{urn:nbn:de:0030-drops-27174},
  doi =		{10.4230/DagSemProc.10141.2},
  annote =	{Keywords: Usage control, access control, data protection, privacy, security policies, trust, trusted computing, compliance, DRM, information flow}
}
Document
Enforcement of Individual Privacy Policies by Communication Service Providers

Authors: Michael Marhoefer and Robert Seidl

Published in: Dagstuhl Seminar Proceedings, Volume 10141, Distributed Usage Control (2010)


Abstract
This talk has two parts: 1. Report on adding Individual Privacy Policies to NSN’s Research Prototype for IDM 2. Challenge for Research in Access/Usage Control: “How to control in Web 2.0 the flow of PII bypassing today’s IDM”

Cite as

Michael Marhoefer and Robert Seidl. Enforcement of Individual Privacy Policies by Communication Service Providers. In Distributed Usage Control. Dagstuhl Seminar Proceedings, Volume 10141, pp. 1-4, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2010)


Copy BibTex To Clipboard

@InProceedings{marhoefer_et_al:DagSemProc.10141.3,
  author =	{Marhoefer, Michael and Seidl, Robert},
  title =	{{Enforcement of Individual Privacy Policies by Communication Service Providers}},
  booktitle =	{Distributed Usage Control},
  pages =	{1--4},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2010},
  volume =	{10141},
  editor =	{Sandro Etalle and Alexander Pretschner and Raiv S. Sandhu and Marianne Winslett},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.10141.3},
  URN =		{urn:nbn:de:0030-drops-27151},
  doi =		{10.4230/DagSemProc.10141.3},
  annote =	{Keywords: Privacy identity IdP browser online-privacy Web 2.0 Communication Service Provider}
}
Document
FORTES: Forensic Information Flow Analysis of Business Processes

Authors: Rafael Accorsi and Günter Müller

Published in: Dagstuhl Seminar Proceedings, Volume 10141, Distributed Usage Control (2010)


Abstract
Nearly 70% of all business processes in use today rely on automated workflow systems for their execution. Despite the growing expenses in the design of advanced tools for secure and compliant deployment of workflows, an exponential growth of dependability incidents persists. Concepts beyond access control focusing on information flow control offer new paradigms to design security mechanisms for reliable and secure IT-based workflows. This talk presents FORTES, an approach for the forensic analysis of information flow properties. FORTES claims that information flow control can be made usable as a core of an audit-control system. For this purpose, it reconstructs workflow models from secure log files (i.e. execution traces) and, applying security policies, analyzes the information flows to distinguish security relevant from security irrelevant information flows. FORTES thus cannot prevent security policy violations, but by detecting them with well-founded analysis, improve the precision of audit controls and the generated certificates.

Cite as

Rafael Accorsi and Günter Müller. FORTES: Forensic Information Flow Analysis of Business Processes. In Distributed Usage Control. Dagstuhl Seminar Proceedings, Volume 10141, pp. 1-3, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2010)


Copy BibTex To Clipboard

@InProceedings{accorsi_et_al:DagSemProc.10141.4,
  author =	{Accorsi, Rafael and M\"{u}ller, G\"{u}nter},
  title =	{{FORTES: Forensic Information Flow Analysis of Business Processes}},
  booktitle =	{Distributed Usage Control},
  pages =	{1--3},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2010},
  volume =	{10141},
  editor =	{Sandro Etalle and Alexander Pretschner and Raiv S. Sandhu and Marianne Winslett},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.10141.4},
  URN =		{urn:nbn:de:0030-drops-27167},
  doi =		{10.4230/DagSemProc.10141.4},
  annote =	{Keywords: Audit, Information flow analysis, business processes}
}
Document
Negotiating Trust on the Grid

Authors: Jim Basney, Wolfgang Nejdl, Daniel Olmedilla, Von Welch, and Marianne Winslett

Published in: Dagstuhl Seminar Proceedings, Volume 5271, Semantic Grid: The Convergence of Technologies (2005)


Abstract
Grids support dynamically evolving collections of resources and users, usually spanning multiple administrative domains. The dynamic and crossorganizational aspects of Grids introduce challenging management and policy issues for controlling access to Grid resources. In this paper we show how to extend the Grid Security Infrastructure to provide better support for the dynamic and cross-organizational aspects of Grid activities, by adding facilities for dynamic establishment of trust between parties. We present the PeerTrust language for access control policies, which is based on guarded distributed logic programs, and show how to use PeerTrust to model common Grid trust needs.

Cite as

Jim Basney, Wolfgang Nejdl, Daniel Olmedilla, Von Welch, and Marianne Winslett. Negotiating Trust on the Grid. In Semantic Grid: The Convergence of Technologies. Dagstuhl Seminar Proceedings, Volume 5271, pp. 1-20, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2005)


Copy BibTex To Clipboard

@InProceedings{basney_et_al:DagSemProc.05271.7,
  author =	{Basney, Jim and Nejdl, Wolfgang and Olmedilla, Daniel and Welch, Von and Winslett, Marianne},
  title =	{{Negotiating Trust on the Grid}},
  booktitle =	{Semantic Grid: The Convergence of Technologies},
  pages =	{1--20},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2005},
  volume =	{5271},
  editor =	{Carole Goble and Carl Kesselman and York Sure},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.05271.7},
  URN =		{urn:nbn:de:0030-drops-3872},
  doi =		{10.4230/DagSemProc.05271.7},
  annote =	{Keywords: Trust, policy, negotiation}
}
  • Refine by Author
  • 3 Winslett, Marianne
  • 2 Etalle, Sandro
  • 2 Pretschner, Alexander
  • 2 Sandhu, Ravi S.
  • 1 Accorsi, Rafael
  • Show More...

  • Refine by Classification

  • Refine by Keyword
  • 2 DRM
  • 2 Usage control
  • 2 access control
  • 2 compliance
  • 2 data protection
  • Show More...

  • Refine by Type
  • 5 document

  • Refine by Publication Year
  • 4 2010
  • 1 2005

Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail