Milcom 2006 2006
DOI: 10.1109/milcom.2006.302517
|View full text |Cite
|
Sign up to set email alerts
|

Policy-Based Management and Sharing of Sensitive Information Among Government Agencies

Abstract: We propose a set of policy-based

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2007
2007
2016
2016

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…Tryg Ager et al [31] intended a set of policy-based technologies to easiness increased information sharing between government agencies without negotiating information security or individual privacy. The approach comprises: (1) fine-grained access controls that support deny and filter semantics for complex policy condition satisfaction; (2) a sticky policy ability that assists consolidation of information from multiple sources subject to the source's original disclosure policies of each; (3) a curation organization that permit agencies to apply and contrive item-level security classifications and disclosure policies; (4) an auditing system that accounts for the curation history of each information item; and (5) a provenance auditing method that traces information derivations over time to offer support in evaluating information quality.…”
Section: Review Of Previous Researchmentioning
confidence: 99%
“…Tryg Ager et al [31] intended a set of policy-based technologies to easiness increased information sharing between government agencies without negotiating information security or individual privacy. The approach comprises: (1) fine-grained access controls that support deny and filter semantics for complex policy condition satisfaction; (2) a sticky policy ability that assists consolidation of information from multiple sources subject to the source's original disclosure policies of each; (3) a curation organization that permit agencies to apply and contrive item-level security classifications and disclosure policies; (4) an auditing system that accounts for the curation history of each information item; and (5) a provenance auditing method that traces information derivations over time to offer support in evaluating information quality.…”
Section: Review Of Previous Researchmentioning
confidence: 99%
“…Therefore, the privacy protection model proposed here governs an interface to data under the jurisdiction of a government body, irrespective of whether it is in the public record or not. We build on those approaches proposed in [4], concerning policy-based fine-grained access control for protecting multi-level classified information. Like the platform for privacy protection, P3P [3], our model provides a mechanism for policies to be specified and exchanged.…”
Section: Technological Safeguards For Privacy Protecting Mashupsmentioning
confidence: 99%
“…Tryg Ager et al [31] designed a set of policy-based technologies to ease increased information sharing between government agencies without negotiating information security or individual privacy. The approach includes: (1) fine-grained access controls that support deny and filter semantics for complex policy condition satisfaction; (2) a sticky policy ability that facilitates consolidation of information from multiple sources subject to the source's original disclosure policies of each; (3) a curation organization that permit agencies to apply and contrive item-level security classifications and disclosure policies; (4) an auditing system that accounts for the curation history of each information item; and (5) a provenance auditing method that traces information derivations over time to offer support in evaluating information quality.…”
Section: Review Of Prior Researchesmentioning
confidence: 99%