A federated architecture for information management
ACM Transactions on Information Systems (TOIS)
Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
Federated database systems for managing distributed, heterogeneous, and autonomous databases
ACM Computing Surveys (CSUR) - Special issue on heterogeneous databases
Interoperability of multiple autonomous databases
ACM Computing Surveys (CSUR) - Special issue on heterogeneous databases
Building an object-oriented database system: the story of 02
Building an object-oriented database system: the story of 02
A taxonomy for secure object-oriented databases
ACM Transactions on Database Systems (TODS)
CIKM '95 Proceedings of the fourth international conference on Information and knowledge management
A framework for supporting data integration using the materialized and virtual approaches
SIGMOD '96 Proceedings of the 1996 ACM SIGMOD international conference on Management of data
Query reformulation for dynamic information integration
Journal of Intelligent Information Systems - Special issue on intelligent integration of information
InfoSleuth: agent-based semantic integration of information in open and dynamic environments
SIGMOD '97 Proceedings of the 1997 ACM SIGMOD international conference on Management of data
A unified framework for enforcing multiple access control policies
SIGMOD '97 Proceedings of the 1997 ACM SIGMOD international conference on Management of data
Argos—a configurable access control system for interoperable environments
Proceedings of the ninth annual IFIP TC11 WG11.3 working conference on Database security IX : status and prospects: status and prospects
KQML as an agent communication language
Software agents
Security enforcement in the DOK federated database system
Proceedings of the tenth annual IFIP TC11/WG11.3 international conference on Database security: volume X : status and prospects: status and prospects
The Unified Modeling Language user guide
The Unified Modeling Language user guide
The object data standard: ODMG 3.0
The object data standard: ODMG 3.0
Providing Security and Interoperation of HeterogeneousSystems
Distributed and Parallel Databases - Security of data and transaction processing
Authorization specification and enforcement in federated database systems
Journal of Computer Security
Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy
Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy
The Conceptual Basis for Mediation Services
IEEE Expert: Intelligent Systems and Their Applications
ICDE '96 Proceedings of the Twelfth International Conference on Data Engineering
Information Integration Using Logical Views
ICDT '97 Proceedings of the 6th International Conference on Database Theory
Querying Heterogeneous Information Sources Using Source Descriptions
VLDB '96 Proceedings of the 22th International Conference on Very Large Data Bases
Web Implementation of a Securtty Mediator for Medical Databases
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
Secure Mediation: Requirements and Design
Proceedings of the IFIP TC11 WG 11.3 Twelfth International Working Conference on Database Security XII: Status and Prospects
Security Architecture of the Multimedia Mediator
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
Rules for Designing Multilevel Object-Oriented Databases
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
Accessing Heterogeneous Data Through Homogenization and Integration Mediators
COOPIS '97 Proceedings of the Second IFCIS International Conference on Cooperative Information Systems
COOPIS '96 Proceedings of the First IFCIS International Conference on Cooperative Information Systems
Towards heterogeneous multimedia information systems: the Garlic approach
RIDE '95 Proceedings of the 5th International Workshop on Research Issues in Data Engineering-Distributed Object Management (RIDE-DOM'95)
Explicit Representation of Constrained Schema Mappings for Mediated Data Integration
DNIS '02 Proceedings of the Second International Workshop on Databases in Networked Information Systems
Security-by-contract for web services
Proceedings of the 2007 ACM workshop on Secure web services
Semantic representation of multimedia content: Knowledge representation and semantic indexing
Multimedia Tools and Applications
Computer Networks: The International Journal of Computer and Telecommunications Networking
Implementation of an agent-oriented trust management infrastructure based on a hybrid PKI model
iTrust'03 Proceedings of the 1st international conference on Trust management
A dynamic security framework for ambient intelligent systems: a smart-home based eHealth application
Transactions on computational science X
Secure mediation with mobile code
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Orchestrating access control in peer data management systems
EDBT'06 Proceedings of the 2006 international conference on Current Trends in Database Technology
ICISS'05 Proceedings of the First international conference on Information Systems Security
Hi-index | 0.00 |
In mediated information systems clients and various autonomous sources are brought together by mediators. The mediation paradigm needs powerful and expressive security mechanisms considering the dynamics and conflicting interests of the mediation participants. Firstly, we discuss the security requirements for mediation with an emphasis on confidentiality and authenticity. We argue for basing the enforcement of these properties on certified personal authorization attributes rather than on identification. Using a public key infrastructure such personal authorization attributes can be bound to asymmetric encryption keys by credentials. Secondly, we propose a general design of secure mediation where credentials are roughly used as follows: clients show their eligibility for receiving requested information by the contained personal authorization attributes, and sources and the mediator guarantee confidentiality by using the contained encryption keys. Thirdly, we refine the general design for a specific approach to mediation, given by our prototype of a Multimedia Mediator, MMM. Among other contributions, we define the authorization model and the specification of query access authorizations within the framework of ODL, as well as the authorization and encryption policies for mediation, and we outline the resulting security architecture of the MMM. We also analyze the achievable security properties including support for anonymity, and we discuss the inevitable tradeoffs between security and mediation functionality.