A Decision Support System for Secure Information Sharing

被引:0
作者
Fokoue, Achille
Srivatsa, Mudhakar
Rohatgi, Pankaj
Wrobel, Peter
Yesberg, John
机构
来源
SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES | 2009年
关键词
Flexible Information Sharing; Justification for Non-Shareability; Description Logics; Semantic Reasoning;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In both the commercial and defense sectors a compelling need is emerging for highly dynamic, yet risk optimized, sharing of information across traditional organizational boundaries. Risk optimal decisions to disseminate mission critical tactical intelligence information to the pertinent actors in a timely manner is critical for a mission's success. In this paper(1), we argue that traditionally decision support mechanisms for information sharing (such as Multi-Level Security (MLS)) besides being rigid and situation agnostic, do not offer explanations and diagnostics for non-shareability. This paper exploits rich security metadata and semantic knowledge-base that captures domain specific concepts and relationships to build a logic for risk optimized information sharing. We show that the proposed approach is: (i) flexible: e.g., sensitivity of tactical information decays with space, time and external events, (ii) situation-aware: e.g., encodes need-to-know based access control policies, and more importantly (iii) supports explanations for non-shareability; these explanations in conjunction with rich security metadata and domain ontology allows a sender to intelligently transform information (e.g., downgrade information, say, by deleting participant list in a meeting) with the goal of making transformed information shareable with the recipient. In this paper, we will describe an architecture for secure information sharing using a publicly available hybrid semantic reasoner and present several illustrative examples that highlight the benefits of our proposal over traditional approaches.
引用
收藏
页码:105 / 114
页数:10
相关论文
共 29 条
[1]  
[Anonymous], P 1998 IEEE S SEC PR
[2]  
Baader Franz, 2003, DESCRIPTION LOGIC HD
[3]   Distributed proving in access-control systems [J].
Bauer, L ;
Gartiss, S ;
Reiter, MK .
2005 IEEE Symposium on Security and Privacy, Proceedings, 2005, :81-95
[4]  
BECKER CFM, 2007, 20 IEEE COMP SEC FDN
[5]  
BECKER MY, 2004, POLICY
[6]  
BELL DE, 1973, 2547 MITRE CORP, P1
[7]   Fuzzy multi-level security : An experiment on quantified risk-adaptive access control - Extended abstract [J].
Cheng, Pau-Chen ;
Rohatgi, Pankaj ;
Keser, Claudia ;
Karger, Paul A. ;
Wagner, Grant M. ;
Reninger, Angela Schuett .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :222-+
[8]  
DOLBY J, 2007, AAAI, P231
[9]  
DOLBY J, 2008, INT SEM WEB C, P403
[10]  
Fikes R., 2005, KNOWLEDGE ASS NOVEL