Specification and deployment of integrated security policies for outsourced data

1Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper presents a well-founded language allowing in one hand data owners to easily specify their security and utility requirements over the data to be outsourced and in an another hand to formalize the set of security mechanisms that can be used for the protection of outsourced data. Based on the formalization of security and utility requirements and security mechanisms properties, we formally identify the best mechanisms, and the best way to combine them to get the best trade-off between utility and security. © 2014 IFIP International Federation for Information Processing.

Cite

CITATION STYLE

APA

Bkakria, A., Cuppens, F., Cuppens-Boulahia, N., & Gross-Amblard, D. (2014). Specification and deployment of integrated security policies for outsourced data. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8566 LNCS, pp. 17–32). Springer Verlag. https://doi.org/10.1007/978-3-662-43936-4_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free