Security of data is tightly coupled to its access policy. However, in practice, a data owner has control of his data’s access policies only as far as the boundaries of his own systems. We introduce graduated access control, which provides mobile, programmable, and dynamically-resolving policies for access control that extends a data owner’s policies across system boundaries. We realize this through a novel data-centric abstraction called trusted capsules and its associated system, the trusted data monitor. A trusted capsule couples data and policy into a single mobile unit. A capsule is backwards-compatible and is indistinguishable from any regular file to applications. In coordination with the trusted data monitor, a capsule provides data ...
Cloud-based platforms have become the principle way to store, share, and synchronize files online. F...
Outsourcing data storage reduces the cost of ownership. However, once data is stored on a remote ser...
Demo PaperInternational audienceThe erosion of trust put in traditional database servers and in Data...
Users desire control over their data even as they share them across device boundaries. At the momen...
As non-expert users produce increasing amounts of personal digital data, usable access control becom...
This paper introduces the notion of a secure data capsule, which refers to an encapsulation of sensi...
The objective of this thesis is to design a suite of techniques to facilitate the storage and manipu...
As computing environments become both mobile and pervasive, the need for robust and flexible access ...
People store and share ever-increasing numbers of digital documents, photos, and other files, b...
In the light of mobile and ubiquitous computing, sharing sensitive information across different comp...
We present Guardat, an architecture that enforces rich data access policies at the storage layer. Us...
Integrity has long been considered a fundamental requirement for secure computerized systems, and es...
Abstract- To keep sensitive user data confidential against untrusted servers, existing solutions usu...
Modern cloud-based services offer free or low-cost content sharing with significant advantages for t...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
Cloud-based platforms have become the principle way to store, share, and synchronize files online. F...
Outsourcing data storage reduces the cost of ownership. However, once data is stored on a remote ser...
Demo PaperInternational audienceThe erosion of trust put in traditional database servers and in Data...
Users desire control over their data even as they share them across device boundaries. At the momen...
As non-expert users produce increasing amounts of personal digital data, usable access control becom...
This paper introduces the notion of a secure data capsule, which refers to an encapsulation of sensi...
The objective of this thesis is to design a suite of techniques to facilitate the storage and manipu...
As computing environments become both mobile and pervasive, the need for robust and flexible access ...
People store and share ever-increasing numbers of digital documents, photos, and other files, b...
In the light of mobile and ubiquitous computing, sharing sensitive information across different comp...
We present Guardat, an architecture that enforces rich data access policies at the storage layer. Us...
Integrity has long been considered a fundamental requirement for secure computerized systems, and es...
Abstract- To keep sensitive user data confidential against untrusted servers, existing solutions usu...
Modern cloud-based services offer free or low-cost content sharing with significant advantages for t...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
Cloud-based platforms have become the principle way to store, share, and synchronize files online. F...
Outsourcing data storage reduces the cost of ownership. However, once data is stored on a remote ser...
Demo PaperInternational audienceThe erosion of trust put in traditional database servers and in Data...