Trusted Collaboration on the Internet

5/27/98


Click here to start


Table of Contents

Trusted Collaboration on the Internet

:

Dominant approach

Remaing Issue: Assuring Secure Collaboration

Collaboration Needs:

The Gap: Assumption that Acess right = Retrievable data

False Assumption

Access Rights/Needs Overlap

Expected Problems

Filling the Gap

Model: Interoperating Domains

Security Mediator

Agents and Privacy

Security Officer

A mediator is not just static software

Roles

Security Officer Functions

Rules implement policy

Coverage of Access Paths

Software Components

Rule system

The Rule Language

Creating Wordlists

PPT Slide

Security Mediator Benefits

Summary

Backup slides

Application of Rules

General mediation approach: isolate value-added processing

Rules for Security Mediators

Rule Processing

The Rule Language - Features...

Rule Type Examples

Rules... (continued)

Security Table Definition

Security Table Definition... (continued)

Rule application - Overview

Implementation

Implementation... (continued)

System Operations

Gio Wiederhold

Author: Gio Wiederhold

Email: gio@CS.STANFORD.EDU

Home Page: www-db.stanford.edu/people/gio.html