DOC PREVIEW
UTD CS 6V81 - Secure Knowledge Management- Confidentiality, Privacy and Trust

This preview shows page 1-2-3-18-19-36-37-38 out of 38 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 38 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 38 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 38 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 38 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 38 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 38 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 38 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 38 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 38 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Data and Applications Security Developments and DirectionsOutline of the UnitReferencesWhat is Knowledge ManagementKnowledge Management ComponentsSlide 6Aspects of Secure Knowledge Management (SKM)SKM: Strategies, Processes, Metrics, TechniquesSlide 9Slide 10Security Policy Issues for Knowledge ManagementSecure Knowledge Management ArchitectureSKM for CoalitionsSKM Coalition ArchitectureRBAC for SKMRBAC for SKM (Sandhu)UCON for SKMUCON for SKM (Sandhu)Trust Management for SKMSlide 20The problem: establishing trust in open systemsTrust Negotiation modelTrust negotiation: the approachSubject properties: digital credentialsSlide 25CredentialsDisclosure policiesDisclosure policies - ExampleDisclosure policies - ExampleTrust Negotiation - definitionTrust-X system: Joint Research with University of MilanTrust-X language: X-TNLX-TNL: Credential type systemTrust-X negotiation phases- basic modelTrust-X ArchitectureHow a policy is processedSKM TechnologiesDirectionsData and Applications Security Developments and DirectionsDr. Bhavani ThuraisinghamThe University of Texas at DallasSecure Knowledge Management: Confidentiality, Privacy and TrustNovember 29, 2005Outline of the UnitBackground on Knowledge ManagementSecure Knowledge ManagementConfidentiality: Access ControlPrivacyTrust ManagementIntegrated SystemSecure Knowledge Management TechnologiesDirectionsReferencesProceedings Secure Knowledge Management Workshop-Secure Knowledge Management Workshop, Buffalo, NY, September 2004-http://www.cse.buffalo.edu/caeiae/skm2004/Secure Knowledge Management-Bertino, Khan, Sandhu and Thuraisingham-To be published in IEEE Transactions on Systems man and Cybernetics-This lecture is based on the above paperWhat is Knowledge ManagementKnowledge management, or KM, is the process through which organizations generate value from their intellectual property and knowledge-based assets KM involves the creation, dissemination, and utilization of knowledgeReference: http://www.commerce-database.com/knowledge-management.htm?source=googleKnowledge Management ComponentsComponents:StrategiesProcessesMetricsCycle:Knowledge, CreationSharing, Measurement And ImprovementTechnologies:Expert systemsCollaborationTrainingWebComponents ofKnowledge Management: Components,Cycle and TechnologiesIdentification CreationDiffusion - Tacit, ExplicitIntegration ModificationActionOrganizational Learning ProcessMetricsSource: Reinhardt and PawlowskyIncentivesAspects of Secure Knowledge Management (SKM)Protecting the intellectual property of an organizationAccess control including role-based access controlSecurity for process/activity management and workflow-Users must have certain credentials to carry out an activityComposing multiple security policies across organizationsSecurity for knowledge management strategies and processesRisk management and economic tradeoffsDigital rights management and trust negotiationSKM: Strategies, Processes, Metrics, TechniquesSecurity Strategies:-Policies and procedures for sharing data-Protecting intellectual property-Should be tightly integrated with business strategySecurity processes-Secure workflow-Processes for contracting, purchasing, order management, etc.Metrics-What is impact of security on number of documents published and other metrics gatheredTechniques-Access control, Trust managementSecurityStrategies: Policies,Plans, andProceduresSecurity Processes:Processes forWorkflow, Order Management, Contracting, - - -Technologies:Privacy PreservingData Mining, Secure Semantic WebComponents ofAspects ofSecure Knowledge ManagementSecurityMetrics:Security impact onMetrics gathered for data sharingSecurityTechniques:Access Control,Trust Management,- - - -SKM: Strategies, Processes, Metrics, TechniquesIdentification CreationDiffusion - Tacit, ExplicitIntegration ModificationActionSecurity Impact on Organizational Learning ProcessMetricsWhat are the restrictionsOn knowledge sharingBy incorporating securityIncentivesSecurity Policy Issues for Knowledge Management Defining Policies during Knowledge CreationRepresenting policies during knowledge managementEnforcing policies during knowledge manipulation and disseminationSecure Knowledge Management ArchitectureKnowledge Creation and Acquisition ManagerKnowledge RepresentationManagerKnowledge Manipulation And SustainmentManagerKnowledge Dissemination and TransferManagerDefine Security Policies Represent Security PoliciesEnforce Security Policies for accessEnforce Security Policies for disseminationSKM for CoalitionsOrganizations for federations and coalitions work together to solve a problem-Universities, Commercial corporation, Government agenciesChallenges is to share data/information and at the same time ensure security and autonomy for the individual organizationsHow can knowledge be shared across coalitions?SKM Coalition ArchitectureExportKnowledgeComponentKnowledge for Agency AKnowledge for CoalitionExportKnowledgeComponentKnowledge for Agency CComponentKnowledge for Agency BExportKnowledgeRBAC for SKMAccess to information sources including structured and unstructured data both within the organization and external to the organization Search Engines and tools for identifying relevant pieces of this information for a specific purposeKnowledge extraction, fusion and discovery programs and servicesControlled dissemination and sharing of newly produced knowledgeRBAC for SKM (Sandhu)UCON for SKMRBAC model is incorporated into UCON and useful for SKM-Authorization componentObligations -Obligations are actions required to be performed before an access is permitted-Obligations can be used to determine whether an expensive knowledge search is requiredAttribute Mutability-Used to control the scope of the knowledge searchCondition-Can be used for resource usage policies to be relaxed or tightenedUCON for SKM (Sandhu)Trust Management for SKMTrust Services-Identify services, authorization services, reputation servicesTrust negotiation (TN)-Digital credentials, Disclosure policiesTN Requirements-Language requirementsSemantics, constraints, policies-System requirementsCredential ownership, validity, alternative negotiation strategies, privacyExample TN systems-KeyNote and Trust-X (U of Milan), TrustBuilder (UIUC)Trust Management for SKMThe problem: establishing trust in open systems Mutual authentication- Assumption on the


View Full Document

UTD CS 6V81 - Secure Knowledge Management- Confidentiality, Privacy and Trust

Documents in this Course
Botnets

Botnets

33 pages

Privacy

Privacy

27 pages

Privacy

Privacy

27 pages

Load more
Download Secure Knowledge Management- Confidentiality, Privacy and Trust
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Secure Knowledge Management- Confidentiality, Privacy and Trust and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Secure Knowledge Management- Confidentiality, Privacy and Trust 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?