Trusted Collaboration on the Internet
:
Dominant approach
Remaing Issue: Assuring Secure Collaboration
Collaboration Needs:
The Gap: Assumption that Acess right = Retrievable data
False Assumption
Access Rights/Needs Overlap
Expected Problems
Filling the Gap
Model: Interoperating Domains
Security Mediator
Agents and Privacy
Security Officer
A mediator is not just static software
Roles
Security Officer Functions
Rules implement policy
Coverage of Access Paths
Software Components
Rule system
The Rule Language
Creating Wordlists
PPT Slide
Security Mediator Benefits
Summary
Backup slides
Application of Rules
General mediation approach: isolate value-added processing
Rules for Security Mediators
Rule Processing
The Rule Language - Features...
Rule Type Examples
Rules... (continued)
Security Table Definition
Security Table Definition... (continued)
Rule application - Overview
Implementation
Implementation... (continued)
System Operations
Gio Wiederhold
Email: gio@CS.STANFORD.EDU
Home Page: www-db.stanford.edu/people/gio.html