Skip to main content

2015 | OriginalPaper | Buchkapitel

XACML Privacy Policy Editor for Critical Infrastructures

verfasst von : Nils Ulltveit-Moe, Henrik Nergaard, Terje Gjøsæter, Jennifer Betts

Erschienen in: Human Aspects of Information Security, Privacy, and Trust

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper describes a Scratch-based eXtensible Access Control Markup Language (XACML) editor ViSPE that can be used for designing authorisation and anonymisation policies, as well as how these policies can be enforced by using the Reversible anonymiser. Private and confidential information can be protected based on identified security requirements, as described in two case studies. The first case covers privacy-enhanced IDS-alarm handling in a traffic control centre, and in the second case, we mitigate insider threats with a secure configuration deployment policy.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
4
Note that this only is a truly ephemeral key if the renegotiation time is set to zero.
 
Literatur
1.
Zurück zum Zitat Moses, T. (ed.): OASIS eXtensible Access Control Markup Language (XACML) Version 2.0 (2005) Moses, T. (ed.): OASIS eXtensible Access Control Markup Language (XACML) Version 2.0 (2005)
2.
Zurück zum Zitat Ulltveit-Moe, N., Oleshchuk, V.: Decision-cache based XACML authorisation and anonymisation for XML documents. Comput. Stand. Interfaces 34(6), 527–534 (2012)CrossRef Ulltveit-Moe, N., Oleshchuk, V.: Decision-cache based XACML authorisation and anonymisation for XML documents. Comput. Stand. Interfaces 34(6), 527–534 (2012)CrossRef
3.
Zurück zum Zitat Ulltveit-Moe, N., Oleshchuk, V.: A novel policy-driven reversible anonymisation scheme for XML-based services. Inf. Syst. 48, 164–178 (2014)CrossRef Ulltveit-Moe, N., Oleshchuk, V.: A novel policy-driven reversible anonymisation scheme for XML-based services. Inf. Syst. 48, 164–178 (2014)CrossRef
4.
Zurück zum Zitat Nergaard, H., Ulltveit-Moe, N., Gjøsæter, T.: A scratch-based graphical policy editor for XACML. In: ICISSP 2015 Proceedings of the 1st International Conference on Information Systems Security and Privacy ESEO, Angers, Loire Valley, France, pp. 182–191 (2015) Nergaard, H., Ulltveit-Moe, N., Gjøsæter, T.: A scratch-based graphical policy editor for XACML. In: ICISSP 2015 Proceedings of the 1st International Conference on Information Systems Security and Privacy ESEO, Angers, Loire Valley, France, pp. 182–191 (2015)
5.
Zurück zum Zitat Malan, D.J., Leitner, H.H.: Scratch for budding computer scientists. In: Proceedings of the 38th SIGCSE Technical Symposium on Computer Science Education, pp. 223–227, New York, NY, USA (2007) Malan, D.J., Leitner, H.H.: Scratch for budding computer scientists. In: Proceedings of the 38th SIGCSE Technical Symposium on Computer Science Education, pp. 223–227, New York, NY, USA (2007)
6.
Zurück zum Zitat Resnick, M., Maloney, J., Monroy-Hernández, A., Rusk, N., Eastmond, E., Brennan, K., Millner, A., Rosenbaum, E., Silver, J., Silverman, B., Kafai, Y.: Scratch: programming for all. Commun. ACM 52(11), 60–67 (2009)CrossRef Resnick, M., Maloney, J., Monroy-Hernández, A., Rusk, N., Eastmond, E., Brennan, K., Millner, A., Rosenbaum, E., Silver, J., Silverman, B., Kafai, Y.: Scratch: programming for all. Commun. ACM 52(11), 60–67 (2009)CrossRef
7.
Zurück zum Zitat Cavoukian, A., Taylor, S., Abrams, M.E.: Privacy by design - essential for organizational accountability and strong business practices. Identity Inf. Soc. 3(2), 405–413 (2010)CrossRef Cavoukian, A., Taylor, S., Abrams, M.E.: Privacy by design - essential for organizational accountability and strong business practices. Identity Inf. Soc. 3(2), 405–413 (2010)CrossRef
8.
Zurück zum Zitat Intel Security: BERserk vulnerability part 1: RSA signature forgery attack due to incorrect parsing of ASN.1 encoded DigestInfo in PKCS#1 v1.5. Intel (2014) Intel Security: BERserk vulnerability part 1: RSA signature forgery attack due to incorrect parsing of ASN.1 encoded DigestInfo in PKCS#1 v1.5. Intel (2014)
9.
10.
Zurück zum Zitat Kuechler, B., Vaishnavi, V.: On theory development in design science research: anatomy of a research project. Eur. J. Inf. Syst. 17(5), 489–504 (2008)CrossRef Kuechler, B., Vaishnavi, V.: On theory development in design science research: anatomy of a research project. Eur. J. Inf. Syst. 17(5), 489–504 (2008)CrossRef
11.
Zurück zum Zitat Mayer, R.E., Jackson, J.: The case for coherence in scientific explanations: quantitative details can hurt qualitative understanding. J. Exp. Psychol. Appl. 11(1), 13–18 (2005)CrossRef Mayer, R.E., Jackson, J.: The case for coherence in scientific explanations: quantitative details can hurt qualitative understanding. J. Exp. Psychol. Appl. 11(1), 13–18 (2005)CrossRef
12.
Zurück zum Zitat Stepien, B., Matwin, S., Felty, A.: Advantages of a non-technical XACML notation in role-based models. In: 2011 Ninth Annual International Conference on Privacy, Security and Trust (PST), pp. 193–200 (2011) Stepien, B., Matwin, S., Felty, A.: Advantages of a non-technical XACML notation in role-based models. In: 2011 Ninth Annual International Conference on Privacy, Security and Trust (PST), pp. 193–200 (2011)
13.
Zurück zum Zitat Stepien, B., Felty, A., Matwin, S.: A non-technical user-oriented display notation for XACML conditions. In: Babin, G., Kropf, P., Weiss, M. (eds.) E-Technologies: Innovation in an Open World. LNBIP, vol. 26, pp. 53–64. Springer, Heidelberg (2009)CrossRef Stepien, B., Felty, A., Matwin, S.: A non-technical user-oriented display notation for XACML conditions. In: Babin, G., Kropf, P., Weiss, M. (eds.) E-Technologies: Innovation in an Open World. LNBIP, vol. 26, pp. 53–64. Springer, Heidelberg (2009)CrossRef
14.
Zurück zum Zitat Stepien, B., Felty, A., Matwin, S.: A non-technical XACML target editor for dynamic access control systems, pp. 150–157. IEEE (2014) Stepien, B., Felty, A., Matwin, S.: A non-technical XACML target editor for dynamic access control systems, pp. 150–157. IEEE (2014)
15.
Zurück zum Zitat Zhao, H., Lobo, J., Bellovin, S.M.: An algebra for integration and analysis of ponder2 policies. In: IEEE Workshop on Policies for Distributed Systems and Networks 2008, POLICY 2008, pp. 74–77 (2008) Zhao, H., Lobo, J., Bellovin, S.M.: An algebra for integration and analysis of ponder2 policies. In: IEEE Workshop on Policies for Distributed Systems and Networks 2008, POLICY 2008, pp. 74–77 (2008)
16.
Zurück zum Zitat Matheus, A. (ed.): OGC 07-026r2 geospatial extensible access control markup language (GeoXACML) version 1.0. Open Geospatial Consortium, Inc. (2007) Matheus, A. (ed.): OGC 07-026r2 geospatial extensible access control markup language (GeoXACML) version 1.0. Open Geospatial Consortium, Inc. (2007)
17.
Zurück zum Zitat Ulltveit-Moe, N., Oleshchuk, V.: Enforcing mobile security with location-aware role-based access control. Secur. Commun. Netw., p. n/a–n/a (2013) Ulltveit-Moe, N., Oleshchuk, V.: Enforcing mobile security with location-aware role-based access control. Secur. Commun. Netw., p. n/a–n/a (2013)
18.
Zurück zum Zitat Ulltveit-Moe, N., Oleshchuk, V.: Mobile security with location-aware role-based access control. In: Prasad, R., Farkas, K., Schmidt, A.U., Lioy, A., Russello, G., Luccio, F.L. (eds.) MobiSec 2011. LNICST, vol. 94, pp. 172–183. Springer, Heidelberg (2012)CrossRef Ulltveit-Moe, N., Oleshchuk, V.: Mobile security with location-aware role-based access control. In: Prasad, R., Farkas, K., Schmidt, A.U., Lioy, A., Russello, G., Luccio, F.L. (eds.) MobiSec 2011. LNICST, vol. 94, pp. 172–183. Springer, Heidelberg (2012)CrossRef
Metadaten
Titel
XACML Privacy Policy Editor for Critical Infrastructures
verfasst von
Nils Ulltveit-Moe
Henrik Nergaard
Terje Gjøsæter
Jennifer Betts
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-20376-8_63