dc.contributor.author |
Asghar, Muhammad |
en |
dc.contributor.author |
Ion, M |
en |
dc.contributor.author |
Russello, Giovanni |
en |
dc.contributor.author |
Crispo, B |
en |
dc.coverage.spatial |
Vienna, Austria |
en |
dc.date.accessioned |
2012-05-24T03:16:59Z |
en |
dc.date.issued |
2011 |
en |
dc.identifier.citation |
The 6th International Conference on Availability, Reliability and Security, ARES 2011, Vienna, Austria, 22 Aug 2011 - 26 Aug 2011. Proceedings of the 2011 6th International Conference on Availability, Reliability and Security, ARES 2011. IEEE. 99-108. 2011 |
en |
dc.identifier.uri |
http://hdl.handle.net/2292/18352 |
en |
dc.description.abstract |
The enforcement of security policies in outsourced environments is still an open challenge for policy-based systems. On the one hand, taking the appropriate security decision requires access to the policies. However, if such access is allowed in an untrusted environment then confidential information might be leaked by the policies. Current solutions are based on cryptographic operations that embed security policies with the security mechanism. Therefore, the enforcement of such policies is performed by allowing the authorised parties to access the appropriate keys. We believe that such solutions are far too rigid because they strictly intertwine authorisation policies with the enforcing mechanism. In this paper, we want to address the issue of enforcing security policies in an untrusted environment while protecting the policy confidentiality. Our solution ESPOON is aiming at providing a clear separation between security policies and the enforcement mechanism. However, the enforcement mechanism should learn as less as possible about both the policies and the requester attributes. |
en |
dc.publisher |
IEEE |
en |
dc.relation.ispartof |
The 6th International Conference on Availability, Reliability and Security, ARES 2011 |
en |
dc.relation.ispartofseries |
Proceedings of the 2011 6th International Conference on Availability, Reliability and Security, ARES 2011 |
en |
dc.rights |
Items in ResearchSpace are protected by copyright, with all rights reserved, unless otherwise indicated. Previously published items are made available in accordance with the copyright policy of the publisher. |
en |
dc.rights.uri |
https://researchspace.auckland.ac.nz/docs/uoa-docs/rights.htm |
en |
dc.title |
ESPOON: Enforcing encrypted security policies in outsourced environments |
en |
dc.type |
Conference Item |
en |
pubs.begin-page |
99 |
en |
dc.rights.holder |
IEEE |
en |
pubs.author-url |
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6045944&tag=1 |
en |
pubs.end-page |
108 |
en |
pubs.finish-date |
2011-08-26 |
en |
pubs.start-date |
2011-08-22 |
en |
dc.rights.accessrights |
http://purl.org/eprint/accessRights/RestrictedAccess |
en |
pubs.subtype |
Abstract |
en |
pubs.elements-id |
345261 |
en |
pubs.org-id |
Science |
en |
pubs.org-id |
School of Computer Science |
en |
pubs.arxiv-id |
1306.4828 |
en |
pubs.record-created-at-source-date |
2012-05-23 |
en |