Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Award Abstract # 0242237
Controlled Release of Information Based on Contents

NSF Org: IIS
Div Of Information & Intelligent Systems
Recipient: GEORGE MASON UNIVERSITY
Initial Amendment Date: June 16, 2003
Latest Amendment Date: June 1, 2007
Award Number: 0242237
Award Instrument: Continuing Grant
Program Manager: Lawrence Brandt
IIS
 Div Of Information & Intelligent Systems
CSE
 Direct For Computer & Info Scie & Enginr
Start Date: June 15, 2003
End Date: May 31, 2008 (Estimated)
Total Intended Award Amount: $0.00
Total Awarded Amount to Date: $150,000.00
Funds Obligated to Date: FY 2003 = $50,000.00
FY 2004 = $50,000.00

FY 2005 = $50,000.00
History of Investigator:
  • Sushil Jajodia (Principal Investigator)
    jajodia@gmu.edu
  • Claudio Bettini (Co-Principal Investigator)
  • Xiaoyang Wang (Co-Principal Investigator)
Recipient Sponsored Research Office: George Mason University
4400 UNIVERSITY DR
FAIRFAX
VA  US  22030-4422
(703)993-2295
Sponsor Congressional District: 11
Primary Place of Performance: George Mason University
4400 UNIVERSITY DR
FAIRFAX
VA  US  22030-4422
Primary Place of Performance
Congressional District:
11
Unique Entity Identifier (UEI): EADLFP7Z72E5
Parent UEI: H4NRWLFCDF43
NSF Program(s): DATA AND APPLICATIONS SECURITY
Primary Program Source:
Program Reference Code(s): 9218, HPCC
Program Element Code(s): 722800
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

Traditionally, access controls have been used to restrict users to
limited views of available data. Although early access control models were devised for structured data, they are being extended to deal with XML data. Access controls, however, are not always sufficient to secure complex information environments. Threats may come,
for example, from incorrect categorization of information or users,
derivation of inferences from legally obtained data, unauthorized exchanges of information between users, and combining data obtained from different internal sources.

This proposal will use a complementary approach to current access
control mechanisms based on checking data not before they are extracted from data sources, but when they are released across a gate representing a critical security boundary. The checking process is
not based simply on source/destination addresses as in current firewall
systems, or on simple ``dirty word'' matching as in current filtering software, but on a deeper content analysis based on release constraints.

In order to achieve this objective, a comprehensive framework is
required that takes into account the different formats outgoing data can have, the complexity and diversity of release control rules, and the necessary support for the security officers in the definition
and management of these rules. A major characteristic of this approach
to separate the specification of critical data, called the controlled items, from the way it is matched against any outgoing information. Technical problems involved in the definition of such a framework include (i) the specification of appropriate formalisms to represent controlled items and matching rules, (ii) the automatic derivation of controlled items from access control rules and their integration with controlled items provided by security officers, (iii) the computation of complete and minimal representation of controlled items and matching rules, and (iv) the design of efficient matching algorithms that are capable of dealing with different matching rules and data formats.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

(Showing: 1 - 10 of 58)
Claudio Bettini, X. Wang and Sushil Jajodia "Information Release Control: A Learning-Based Architecture" Journal of Data Semantics, Springer , v.2 , 2005 , p.176
Claudio Bettini, Sushil Jajodia, and X. Sean Wang "Reasoning with advanced policy rules and its application to access control" Journal of Digital Libraries , v.4 , 2004 , p.156
Claudio Bettini, Sushil Jajodia, X. Wang, and Duminda Wijesekera "Provisions and obligations in policy rule management" Journal of Network and Systems Management , v.11 , 2003 , p.351
Claudio Bettini, X. Wang and Sushil Jajodia "A Learning-based Aprroach to Information Release Control" Sixth IFIP TC-11 WG 11.5 Working Conference on Integrity and Internal Control in Information Systems , 2003 , p.83
Claudio Bettini, X. Wang, and Sushil Jajodia "Identifying Sensitive Associations in Databases for Release Control" VLDB Workshop on Secure Data Management in a Connected World (SDM) , 2004 , p.187
Shiping Chen, Duminda Wijesekera, Sushil Jajodia "Incorporating Dynamic Constraints in the Flexible Authorization Framework" Proc. 9th European Symp. on Research in Computer Security (ESORICS) , 2004 , p.1
Lingyu Wang, Yingjiu Li, Sushil Jajodia, Duminda Wijesekera "Parity-based inference control for multi-dimensional range sum queries" Journal of Computer Security , v.15 , 2007
Peter Chapin, Christian Skalka, Xiaoyang Sean Wang "Risk assessment in distributed authorization" Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005 , 2005 , p.33
Lingyu Wang, Anyi Liu, Sushil Jajodia "Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts" Computer Communications , v.29 , 2006 , p.2917
Hemant Sengar, Ram Dantu, Duminda Wijesekera, Sushil Jajodia "SS7 over IP: Signaling internetworking vulnerabilities" IEEE Network , v.20 , 2006 , p.32
Csilla Farkas, Alexander Brodsky, Sushil Jajodia "Unauthorized inferences in semi-structured databases" Information Sciences , v.176 , 2006 , p.3269
(Showing: 1 - 10 of 58)

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page