Cardiff University | Prifysgol Caerdydd ORCA
Online Research @ Cardiff 
WelshClear Cookie - decide language by browser settings

Self protecting data for de-perimeterised information sharing

Burnap, Peter and Hilton, Jeremy Charles 2009. Self protecting data for de-perimeterised information sharing. Presented at: Third International Conference on Digital Society ICDS '09, Cancun, Mexico, 1-7 February 2009. Digital Society, 2009. ICDS '09. Third International Conference on. IEEE, pp. 65-70. 10.1109/ICDS.2009.41

[img]
Preview
PDF - Accepted Post-Print Version
Download (276kB) | Preview

Abstract

The emergence of high-speed networks, Grid Computing, Service-Oriented Architectures, and an ever increasing ambient connection to mobile Internet has enabled an underpinning infrastructure for the development of dynamically formed, collaborative working groups known as Virtual Organisations (VOs). VOs provide strong motivation for investigation into the infrastructure, and in particular the security necessary to protect the information and resources shared within a VO, both while resident on local machines and when allowed to move beyond the secure boundary of a local organisational network perimeter and into the realm of the distributed VO. Traditional access control systems are perimeter- centric, meaning they apply the controls to both internal and external requests for access to information within or at the perimeter of their information system. • This paper presents the initial results of the JISC funded SPIDER project, being led by Cardiff University. Through case based example, the research investigates the limitations to granularity and persistent control over information when using the perimeter- centric approach in a collaborative working environment.

Item Type: Conference or Workshop Item (Paper)
Date Type: Publication
Status: Published
Schools: Computer Science & Informatics
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Uncontrolled Keywords: Collborative Working, DRM, Data Level Security, Distributed, Information Security
Publisher: IEEE
ISBN: 9781424435506
Funders: JISC
Last Modified: 04 Jun 2017 04:59
URI: http://orca-mwe.cf.ac.uk/id/eprint/47071

Citation Data

Cited 8 times in Google Scholar. View in Google Scholar

Cited 10 times in Scopus. View in Scopus. Powered By Scopus® Data

Actions (repository staff only)

Edit Item Edit Item

Full Text Downloads from ORCA for this publication

Top Downloads of this item by Country

Monthly Full Text Downloads of this item

More statistics for this item...