2009
DOI: 10.1007/978-3-642-03007-9_18
|View full text |Cite
|
Sign up to set email alerts
|

PAES: Policy-Based Authority Evaluation Scheme

Abstract: Abstract. Enterprise Rights Management (ERM) systems aim to protect disseminated data even after it has been sent to remote locations. Existing systems are based on common components, have similar functionalities and often have two shortcomings: a centralised architecture and a lack of concern for the trust and privacy of data recipients. To access the data, recipients must present their credentials to a policy evaluation authority, which they cannot choose and may not trust. Furthermore, recipients may be una… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2010
2010
2016
2016

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…[6] considers policies that restrict the use and replication of information, e.g., imposing that certain information may only be used or copied a certain number of times. Related to the sharing of data, but not strictly related to analysis, [9,20,21] present on opportunistic authority evaluation scheme for sharing data in a secure way in a crisis management scenario. The main idea is to combine two already existing data sharing solutions to share data in a secure way through opportunistic networks.…”
Section: State Of the Artmentioning
confidence: 99%
“…[6] considers policies that restrict the use and replication of information, e.g., imposing that certain information may only be used or copied a certain number of times. Related to the sharing of data, but not strictly related to analysis, [9,20,21] present on opportunistic authority evaluation scheme for sharing data in a secure way in a crisis management scenario. The main idea is to combine two already existing data sharing solutions to share data in a secure way through opportunistic networks.…”
Section: State Of the Artmentioning
confidence: 99%
“…Related to the sharing of data, but not strictly related to analysis, [23,24] present on opportunistic authority evaluation scheme for sharing data in a secure way in a crisis management scenario. The main idea is to combine two already existing data sharing solutions in order to share data in a secure way through opportunistic networks.…”
Section: Related Workmentioning
confidence: 99%
“…The Policy-based Authority Evaluation Scheme (PAES) [22] allows a data originator to specify a hierarchy of authorities trusted to correctly evaluate its policies. The set of authorities trusted to evaluate the usage control policies is not statically defined, but designated by a trust policy evaluated by a higher level authority.…”
Section: Related Workmentioning
confidence: 99%
“…The ad hoc distribution of rights in form of private-keys of groups is controlled by policies, inspired by the Policy-based Authority Evaluation Scheme (PAES) [22]. The private keys are always stored by the PEP securely and are not directly accessible to end-users (discussed further in Section 7).…”
Section: Unified Cross-domain Data Sharing Architecture (Udsa)mentioning
confidence: 99%