Securing context-aware applications using environment roles
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Context Authentication Using Constrained Channels
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
A Trust-based Context-Aware Access Control Model for Web-Services
ICWS '04 Proceedings of the IEEE International Conference on Web Services
Access control in collaborative systems
ACM Computing Surveys (CSUR)
A survey of context modelling and reasoning techniques
Pervasive and Mobile Computing
A security policy model for clinical information systems
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
A policy framework for integrated and differentiated services in the Internet
IEEE Network: The Magazine of Global Internetworking
AAA: a survey and a policy-based architecture and framework
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
Nowadays a growing amount of information not only exists in digital form but was actually born-digital. Digital long-term preservation becomes continuously important and is tackled by several international and national projects like the US National Digital Information Infrastructure and Preservation Program or the EU FP7 SHAMAN Integrated Project. The very essence of long-term preservation is the preserved data, which in turn requires an appropriate security model, which is so far often neglected in the preservation community. To address this problem, we extend the security relevant parts of the Open Archival Information System (OAIS) standard by a concept for hierarchical security policy development based on given use-cases for a long-term archival system. The corresponding policies are then distributed and implemented by applying an iterative procedure to turn them to rules, and then the rules are enforced. In this paper we describe how to construct a corresponding context model and derive such policies using an iterative approach to assure the system and data security.