Skip to main content

2016 | OriginalPaper | Buchkapitel

Data Governance and Transparency for Collaborative Systems

verfasst von : Rauf Mahmudlu, Jerry den Hartog, Nicola Zannone

Erschienen in: Data and Applications Security and Privacy XXX

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

As social networks, shared editing platforms and other collaborative systems are becoming increasingly popular, the demands for proper protection of the data created and used within these systems grows. Yet, existing access control mechanisms are not suited for the challenges imposed by collaborative systems. Two main challenges should be addressed: collaborative specification of permissions, while ensuring an appropriate levels of control to the different parties involved, and enabling transparency in decision making in cases where the access requirements of these different parties are in conflict. In this paper we propose a data governance model for collaborative systems, which allows the integration of access requirements specified by different users based on their relation with a data object. We also study the practical feasibility of enabling transparency by comparing different deployment options for transparency in XACML.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Note that legal requirements can also define the relation between stakeholders. In the next section we will discuss how these requirements can be accommodated in the framework.
 
2
Although any combining algorithm can be used to combine user policies and archetype policies, the use of noncommutative algorithms can have undesired effects. In fact, these algorithms often represent a priority between policies based on their order (e.g., \(\mathsf{first{\text {-}}applicable}\) in XACML), whereas there is no order within an archetype or a level.
 
Literatur
1.
Zurück zum Zitat Albrecht, U.V.: Transparency of health-apps for trust and decision making. J. Med. Internet Res. 15(12), e277 (2013)MathSciNetCrossRef Albrecht, U.V.: Transparency of health-apps for trust and decision making. J. Med. Internet Res. 15(12), e277 (2013)MathSciNetCrossRef
2.
Zurück zum Zitat Damen, S., den Hartog, J., Zannone, N.: CollAC: Collaborative access control. In: Proceedings of CTS, pp. 142–149. IEEE (2014) Damen, S., den Hartog, J., Zannone, N.: CollAC: Collaborative access control. In: Proceedings of CTS, pp. 142–149. IEEE (2014)
3.
Zurück zum Zitat Damen, S., Zannone, N.: Privacy implications of privacy settings and tagging in facebook. In: Jonker, W., Petković, M. (eds.) SDM 2013. LNCS, vol. 8425, pp. 121–138. Springer, Heidelberg (2014)CrossRef Damen, S., Zannone, N.: Privacy implications of privacy settings and tagging in facebook. In: Jonker, W., Petković, M. (eds.) SDM 2013. LNCS, vol. 8425, pp. 121–138. Springer, Heidelberg (2014)CrossRef
4.
Zurück zum Zitat de Fine Licht, J.: Transparency actually: how transparency affects public perceptions of political decision-making. Eur. Political Sci. Rev. 6(02), 309–330 (2014)CrossRef de Fine Licht, J.: Transparency actually: how transparency affects public perceptions of political decision-making. Eur. Political Sci. Rev. 6(02), 309–330 (2014)CrossRef
5.
Zurück zum Zitat Ghai, S.K., Nigam, P., Kumaraguru, P.: Cue: A framework for generating meaningful feedback in XACML. In: Proceedings of SafeConfig, pp. 9–16. ACM (2010) Ghai, S.K., Nigam, P., Kumaraguru, P.: Cue: A framework for generating meaningful feedback in XACML. In: Proceedings of SafeConfig, pp. 9–16. ACM (2010)
6.
Zurück zum Zitat Guarda, P., Zannone, N.: Towards the development of privacy-aware systems. Inf. Softw. Technol. 51(2), 337–350 (2009)CrossRef Guarda, P., Zannone, N.: Towards the development of privacy-aware systems. Inf. Softw. Technol. 51(2), 337–350 (2009)CrossRef
7.
Zurück zum Zitat Hu, H., Ahn, G.J., Jorgensen, J.: Multiparty access control for online social networks: model and mechanisms. TKDE 25(7), 1614–1627 (2013) Hu, H., Ahn, G.J., Jorgensen, J.: Multiparty access control for online social networks: model and mechanisms. TKDE 25(7), 1614–1627 (2013)
8.
Zurück zum Zitat Jajodia, S., Samarati, P., Sapino, M.L., Subrahmanian, V.S.: Flexible support for multiple access control policies. ACM Trans. Database Syst. 26(2), 214–260 (2001)CrossRefMATH Jajodia, S., Samarati, P., Sapino, M.L., Subrahmanian, V.S.: Flexible support for multiple access control policies. ACM Trans. Database Syst. 26(2), 214–260 (2001)CrossRefMATH
9.
Zurück zum Zitat Joshi, A., Bollen, L., Hassink, H.: An empirical assessment of it governance transparency: evidence from commercial banking. Inf. Sys. Manag. 30(2), 116–136 (2013)CrossRef Joshi, A., Bollen, L., Hassink, H.: An empirical assessment of it governance transparency: evidence from commercial banking. Inf. Sys. Manag. 30(2), 116–136 (2013)CrossRef
10.
Zurück zum Zitat Kaluvuri, S.P., Egner, A.I., den Hartog, J., Zannone, N.: SAFAX – Anextensible authorization service for cloud environments. Front. ICT 2(9) (2015) Kaluvuri, S.P., Egner, A.I., den Hartog, J., Zannone, N.: SAFAX – Anextensible authorization service for cloud environments. Front. ICT 2(9) (2015)
11.
Zurück zum Zitat Li, N., Wang, Q., Qardaji, W., Bertino, E., Rao, P., Lobo, J., Lin, D.: Access control policy combining: theory meets practice. In: Proceedings of SACMAT, pp. 135–144. ACM (2009) Li, N., Wang, Q., Qardaji, W., Bertino, E., Rao, P., Lobo, J., Lin, D.: Access control policy combining: theory meets practice. In: Proceedings of SACMAT, pp. 135–144. ACM (2009)
12.
Zurück zum Zitat Matteucci, I., Mori, P., Petrocchi, M.: Prioritized execution of privacy policies. In: Di Pietro, R., Herranz, J., Damiani, E., State, R. (eds.) DPM 2012 and SETOP 2012. LNCS, vol. 7731, pp. 133–145. Springer, Heidelberg (2013)CrossRef Matteucci, I., Mori, P., Petrocchi, M.: Prioritized execution of privacy policies. In: Di Pietro, R., Herranz, J., Damiani, E., State, R. (eds.) DPM 2012 and SETOP 2012. LNCS, vol. 7731, pp. 133–145. Springer, Heidelberg (2013)CrossRef
13.
Zurück zum Zitat Mazzoleni, P., Crispo, B., Sivasubramanian, S., Bertino, E.: XACML policy integration algorithms. ACM Trans. Inf. Syst. Secur. 11(1), 4:1–4:29 (2008)CrossRef Mazzoleni, P., Crispo, B., Sivasubramanian, S., Bertino, E.: XACML policy integration algorithms. ACM Trans. Inf. Syst. Secur. 11(1), 4:1–4:29 (2008)CrossRef
14.
Zurück zum Zitat OASIS XACML Technical Committee: eXtensible Access Control Markup Language (XACML) Version 2.0 (2005) OASIS XACML Technical Committee: eXtensible Access Control Markup Language (XACML) Version 2.0 (2005)
15.
Zurück zum Zitat Reeder, R.W., Bauer, L., Cranor, L.F., Reiter, M.K., Vaniea, K.: Effects of access-control policy conflict-resolution methods on policy-authoring usability. CyLab, p. 12 (2009) Reeder, R.W., Bauer, L., Cranor, L.F., Reiter, M.K., Vaniea, K.: Effects of access-control policy conflict-resolution methods on policy-authoring usability. CyLab, p. 12 (2009)
16.
Zurück zum Zitat Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer 29(2), 38–47 (1996)CrossRef Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer 29(2), 38–47 (1996)CrossRef
17.
Zurück zum Zitat Shen, H., Dewan, P.: Access control for collaborative environments. In: Proceedings of Conference on Computer-supported Cooperative Work, pp. 51–58. ACM (1992) Shen, H., Dewan, P.: Access control for collaborative environments. In: Proceedings of Conference on Computer-supported Cooperative Work, pp. 51–58. ACM (1992)
18.
Zurück zum Zitat Squicciarini, A.C., Shehab, M., Paci, F.: Collective privacy management in social networks. In: Proceedings of WWW, pp. 521–530. ACM (2009) Squicciarini, A.C., Shehab, M., Paci, F.: Collective privacy management in social networks. In: Proceedings of WWW, pp. 521–530. ACM (2009)
19.
Zurück zum Zitat Thomas, R.K.: Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments. In: Proceedings of RBAC, pp. 13–19. ACM (1997) Thomas, R.K.: Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments. In: Proceedings of RBAC, pp. 13–19. ACM (1997)
20.
Zurück zum Zitat Thomas, R.K., Sandhu, R.S.: Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management. In: DBSec, pp. 166–181. Springer, Heidelberg (1997) Thomas, R.K., Sandhu, R.S.: Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management. In: DBSec, pp. 166–181. Springer, Heidelberg (1997)
21.
Zurück zum Zitat Tolone, W., Ahn, G.J., Pai, T., Hong, S.P.: Access control in collaborative systems. ACM Comput. Surv. 37(1), 29–41 (2005)CrossRef Tolone, W., Ahn, G.J., Pai, T., Hong, S.P.: Access control in collaborative systems. ACM Comput. Surv. 37(1), 29–41 (2005)CrossRef
Metadaten
Titel
Data Governance and Transparency for Collaborative Systems
verfasst von
Rauf Mahmudlu
Jerry den Hartog
Nicola Zannone
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-41483-6_15

Neuer Inhalt