Towards usage control models: beyond traditional access control
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Role-Based Access Control
A composite rbac approach for large, complex organizations
Proceedings of the ninth ACM symposium on Access control models and technologies
Secure information sharing enabled by Trusted Computing and PEI models
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
netWorker
Digital rights management using a mobile phone
Proceedings of the ninth international conference on Electronic commerce
Authorised domain management using location based services
Mobility '07 Proceedings of the 4th international conference on mobile technology, applications, and systems and the 1st international symposium on Computer human interaction in mobile technology
Preventing Insider Information Leakage for Enterprises
SECURWARE '08 Proceedings of the 2008 Second International Conference on Emerging Security Information, Systems and Technologies
Trusted computing: special aspects and challenges
SOFSEM'08 Proceedings of the 34th conference on Current trends in theory and practice of computer science
A framework for establishing trust in the Cloud
Computers and Electrical Engineering
Hi-index | 0.00 |
Information sharing and protection against leakage is a critical problem especially for organisations having sensitive information. Sharing content between individuals in the same organisation extends to exchanging and sharing content between collaborating organisations. In this paper we propose a novel solution for preventing shared information between collaborating organisations from getting leaked to unauthorised users inside the distination organisation or out side it. In addition, once the content is in the hands of authorised users our solution prevents unethical authorised users from leaking such content to other users in the same organisation or third parties. In this paper we provide a mechanism for a source organisation to send content to another collaborating organisation in such a way the sent content is either accessed by a specific group of users performing a specific task or it could be accessed by all devices member in the destination organisation, which should be based on organisation policy and requirements. In the proposed solution we used trusted computing technology to provide a hardware-based root of trust for the master controller and organisation devices.