Proceedings of the 2009 ACM Symposium on Applied Computing 2009
DOI: 10.1145/1529282.1529738
|View full text |Cite
|
Sign up to set email alerts
|

Secure web-based retrieval of documents with usage controls

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
1
1
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…The corresponding data usage policies are stored as file metadata, while the key for decryption of the encrypted file system is sealed to a trusted configuration using the TPM. This ensures that the file system decryption key is only accessible if the system's current software stack, which is [47] enables the secure posting and retrieval of protected documents via web servers.…”
Section: Securing Data Usage Control Infrastructuresmentioning
confidence: 99%
“…The corresponding data usage policies are stored as file metadata, while the key for decryption of the encrypted file system is sealed to a trusted configuration using the TPM. This ensures that the file system decryption key is only accessible if the system's current software stack, which is [47] enables the secure posting and retrieval of protected documents via web servers.…”
Section: Securing Data Usage Control Infrastructuresmentioning
confidence: 99%
“…Brustolini et al propose a simplified version where policies are specified through allowing or denying specific operations (open, copy, print, etc.) on digital objects [6,9]. The system comprises a kernel level security module for SELinux, a web browser plugin and a modified web server that offers the ability to post information objects to a web service.…”
Section: Proactive Enforcementmentioning
confidence: 99%
“…Djalaliev et al do provide a benchmark of regular HTTP and TLS traffic and show that the modified TLS used for attestation only introduces an increase in CPU usage of about 20% [9]. The latency analysis demonstrates that usage controlled file retrieval introduces a penalty varying from 100% to 30% with increasing file sizes.…”
Section: Testing and Evaluationmentioning
confidence: 99%
“…To allow distributors of information subject to usage controls to verify the trustworthiness of a UCLinux-based platform, UCLinux uses a version of the TLS v1.0 protocol [14], extended to include attestation during its handshake [10].…”
Section: Attestationmentioning
confidence: 99%