This paper presents a well-founded language allowing in one hand data owners to easily specify their security and utility requirements over the data to be outsourced and in an another hand to formalize the set of security mechanisms that can be used for the protection of outsourced data. Based on the formalization of security and utility requirements and security mechanisms properties, we formally identify the best mechanisms, and the best way to combine them to get the best trade-off between utility and security. © 2014 IFIP International Federation for Information Processing.
CITATION STYLE
Bkakria, A., Cuppens, F., Cuppens-Boulahia, N., & Gross-Amblard, D. (2014). Specification and deployment of integrated security policies for outsourced data. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8566 LNCS, pp. 17–32). Springer Verlag. https://doi.org/10.1007/978-3-662-43936-4_2
Mendeley helps you to discover research relevant for your work.