TY - CHAP
T1 - Security policy and information sharing in distributed event-based systems
AU - Shand, Brian
AU - Pietzuch, Peter
AU - Papagiannis, Ioannis
AU - Moody, Ken
AU - Migliavacca, Matteo
AU - Eyers, David M.
AU - Bacon, Jean
PY - 2011
Y1 - 2011
N2 - Linking security policy into event-based systems allows formal reasoning about information security. In the applications we address, highly confidential data must be shared both dynamically and for historical analysis. Principals with rights to access the data may be widely distributed, existing in a federation of independent administrative domains. Domain managers are responsible for the data held within domains and transmitted from them; security policy must be specified and enforced in order to meet these obligations. We motivate the event-driven paradigm and take healthcare as a running example, because the confidentiality of healthcare data must be guaranteed over many years. We first consider how to enforce authorisation policy at the client level through parametrised role-based access control (RBAC), taking context into account. We then discuss the additional requirements for secure information flow through the infrastructure components that contribute to communication within and between distributed domains. Finally, we show how this approach supports reasoning about event security in large-scale distributed systems.
AB - Linking security policy into event-based systems allows formal reasoning about information security. In the applications we address, highly confidential data must be shared both dynamically and for historical analysis. Principals with rights to access the data may be widely distributed, existing in a federation of independent administrative domains. Domain managers are responsible for the data held within domains and transmitted from them; security policy must be specified and enforced in order to meet these obligations. We motivate the event-driven paradigm and take healthcare as a running example, because the confidentiality of healthcare data must be guaranteed over many years. We first consider how to enforce authorisation policy at the client level through parametrised role-based access control (RBAC), taking context into account. We then discuss the additional requirements for secure information flow through the infrastructure components that contribute to communication within and between distributed domains. Finally, we show how this approach supports reasoning about event security in large-scale distributed systems.
UR - http://www.scopus.com/inward/record.url?scp=79953825568&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-19724-6_7
DO - 10.1007/978-3-642-19724-6_7
M3 - Chapter
AN - SCOPUS:79953825568
SN - 9783642197239
T3 - Studies in Computational Intelligence
SP - 151
EP - 172
BT - Reasoning in Event-Based Distributed Systems
ER -