Specification and Deployment of Integrated Security Policies for Outsourced Data
Abstract
This paper presents a well-founded language allowing in one hand data owners to easily specify their security and utility requirements over the data to be outsourced and in an another hand to formalize the set of security mechanisms that can be used for the protection of out-sourced data. Based on the formalization of security and utility require-ments and security mechanisms properties, we formally identify the best mechanisms, and the best way to combine them to get the best trade-off between utility and security.
Origin | Files produced by the author(s) |
---|