Dagstuhl Seminar Proceedings, Volume 10141



Publication Details

  • published at: 2010-08-05
  • Publisher: Schloss Dagstuhl – Leibniz-Zentrum für Informatik

Access Numbers

Documents

No documents found matching your filter selection.
Document
10141 Abstracts Collection – Distributed Usage Control

Authors: Sandro Etalle, Alexander Pretschner, Ravi S. Sandhu, and Marianne Winslett


Abstract
From 06.04. to 09.04.2010, the Dagstuhl Seminar 10141 ``Distributed Usage Control '' was held in Schloss Dagstuhl~--~Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put together in this paper. The first section describes the seminar topics and goals in general. Links to extended abstracts or full papers are provided, if available.

Cite as

Sandro Etalle, Alexander Pretschner, Ravi S. Sandhu, and Marianne Winslett. 10141 Abstracts Collection – Distributed Usage Control. In Distributed Usage Control. Dagstuhl Seminar Proceedings, Volume 10141, pp. 1-12, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2010)


Copy BibTex To Clipboard

@InProceedings{etalle_et_al:DagSemProc.10141.1,
  author =	{Etalle, Sandro and Pretschner, Alexander and Sandhu, Ravi S. and Winslett, Marianne},
  title =	{{10141 Abstracts Collection – Distributed Usage Control}},
  booktitle =	{Distributed Usage Control},
  pages =	{1--12},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2010},
  volume =	{10141},
  editor =	{Sandro Etalle and Alexander Pretschner and Raiv S. Sandhu and Marianne Winslett},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.10141.1},
  URN =		{urn:nbn:de:0030-drops-27185},
  doi =		{10.4230/DagSemProc.10141.1},
  annote =	{Keywords: Usage control, access control, data protection, privacy, security policies, trust, trusted computing, compliance, DRM, information flow}
}
Document
10141 Summary – Distributed Usage Control

Authors: Sandro Etalle, Alexander Pretschner, Ravi S. Sandhu, and Marianne Winslett


Abstract
We summarize Dagstuhl seminar 10141 on Distributed Usage Control.

Cite as

Sandro Etalle, Alexander Pretschner, Ravi S. Sandhu, and Marianne Winslett. 10141 Summary – Distributed Usage Control. In Distributed Usage Control. Dagstuhl Seminar Proceedings, Volume 10141, pp. 1-4, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2010)


Copy BibTex To Clipboard

@InProceedings{etalle_et_al:DagSemProc.10141.2,
  author =	{Etalle, Sandro and Pretschner, Alexander and Sandhu, Ravi S. and Winslett, Marianne},
  title =	{{10141 Summary – Distributed Usage Control}},
  booktitle =	{Distributed Usage Control},
  pages =	{1--4},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2010},
  volume =	{10141},
  editor =	{Sandro Etalle and Alexander Pretschner and Raiv S. Sandhu and Marianne Winslett},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.10141.2},
  URN =		{urn:nbn:de:0030-drops-27174},
  doi =		{10.4230/DagSemProc.10141.2},
  annote =	{Keywords: Usage control, access control, data protection, privacy, security policies, trust, trusted computing, compliance, DRM, information flow}
}
Document
Enforcement of Individual Privacy Policies by Communication Service Providers

Authors: Michael Marhoefer and Robert Seidl


Abstract
This talk has two parts: 1. Report on adding Individual Privacy Policies to NSN’s Research Prototype for IDM 2. Challenge for Research in Access/Usage Control: “How to control in Web 2.0 the flow of PII bypassing today’s IDM”

Cite as

Michael Marhoefer and Robert Seidl. Enforcement of Individual Privacy Policies by Communication Service Providers. In Distributed Usage Control. Dagstuhl Seminar Proceedings, Volume 10141, pp. 1-4, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2010)


Copy BibTex To Clipboard

@InProceedings{marhoefer_et_al:DagSemProc.10141.3,
  author =	{Marhoefer, Michael and Seidl, Robert},
  title =	{{Enforcement of Individual Privacy Policies by Communication Service Providers}},
  booktitle =	{Distributed Usage Control},
  pages =	{1--4},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2010},
  volume =	{10141},
  editor =	{Sandro Etalle and Alexander Pretschner and Raiv S. Sandhu and Marianne Winslett},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.10141.3},
  URN =		{urn:nbn:de:0030-drops-27151},
  doi =		{10.4230/DagSemProc.10141.3},
  annote =	{Keywords: Privacy identity IdP browser online-privacy Web 2.0 Communication Service Provider}
}
Document
FORTES: Forensic Information Flow Analysis of Business Processes

Authors: Rafael Accorsi and Günter Müller


Abstract
Nearly 70% of all business processes in use today rely on automated workflow systems for their execution. Despite the growing expenses in the design of advanced tools for secure and compliant deployment of workflows, an exponential growth of dependability incidents persists. Concepts beyond access control focusing on information flow control offer new paradigms to design security mechanisms for reliable and secure IT-based workflows. This talk presents FORTES, an approach for the forensic analysis of information flow properties. FORTES claims that information flow control can be made usable as a core of an audit-control system. For this purpose, it reconstructs workflow models from secure log files (i.e. execution traces) and, applying security policies, analyzes the information flows to distinguish security relevant from security irrelevant information flows. FORTES thus cannot prevent security policy violations, but by detecting them with well-founded analysis, improve the precision of audit controls and the generated certificates.

Cite as

Rafael Accorsi and Günter Müller. FORTES: Forensic Information Flow Analysis of Business Processes. In Distributed Usage Control. Dagstuhl Seminar Proceedings, Volume 10141, pp. 1-3, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2010)


Copy BibTex To Clipboard

@InProceedings{accorsi_et_al:DagSemProc.10141.4,
  author =	{Accorsi, Rafael and M\"{u}ller, G\"{u}nter},
  title =	{{FORTES: Forensic Information Flow Analysis of Business Processes}},
  booktitle =	{Distributed Usage Control},
  pages =	{1--3},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2010},
  volume =	{10141},
  editor =	{Sandro Etalle and Alexander Pretschner and Raiv S. Sandhu and Marianne Winslett},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.10141.4},
  URN =		{urn:nbn:de:0030-drops-27167},
  doi =		{10.4230/DagSemProc.10141.4},
  annote =	{Keywords: Audit, Information flow analysis, business processes}
}

Filters