1 TIUPAM: A Framework for Trustworthiness-centric Information Sharing Shouhuai Xu Univ. Texas at San Antonio Joint work with Qun Ni and Elisa Bertino (Purdue.

Slides:



Advertisements
Similar presentations
INSTITUTE FOR CYBER SECURITY 1 Trusted Computing Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University.
Advertisements

Cyber-Identity, Authority and Trust in an Uncertain World
Privacy-Enhancing Models and Mechanisms for Securing Provenance and its Use October 2010 Lead PI: Ravi Sandhu (UT San Antonio) PIs: Elisa Bertino (Purdue),
1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
INSTITUTE FOR CYBER SECURITY 1 Industry-Academia Research Synergy: Fantasy or Reality? Ravi Sandhu Executive Director and Endowed Professor Institute for.
INSTITUTE FOR CYBER SECURITY 1 The PEI + UCON Framework for Application Security Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
QUN NI 1, SHOUHUAI XU 2, ELISA BERTINO 1, RAVI SANDHU 2, AND WEILI HAN 3 1 PURDUE UNIVERSITY USA 2 UT SAN ANTONIO USA 3 FUDAN UNIVERSITY CHINA PRESENTED.
A New Modeling Paradigm for Dynamic Authorization in Multi-Domain Systems MMM-ACNS, September 13, 2007 Manoj Sastry, Ram Krishnan, Ravi Sandhu Intel Corporation,
INSTITUTE FOR CYBER SECURITY 1 The PEI Framework for Application-Centric Security Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for.
Stale-Safe Security Properties for Secure Information Sharing Ram Krishnan (GMU) Jianwei Niu (UT San Antonio) Ravi Sandhu (UT San Antonio) William Winsborough.
INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.
Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures Erhan J. Kartaltepe 1, Jose Andre Morales 1, Shouhuai Xu 2, Ravi.
Towards a VMM-based Usage Control Framework for OS Kernel Integrity Protection Min Xu George Mason University Xuxian Jiang George Mason University Ravi.
ISA 662 IKE Key management for IPSEC Prof. Ravi Sandhu.
Institute for Cyber Security
Towards A Framework for Cyber Social Status Based Trusted Open Collaboration Oct. 9, 2010 Jaehong Park, Yuan Cheng, Ravi Sandhu Institute for Cyber Security.
A First Step Towards Characterizing Stealthy Botnets Justin Leonard, Shouhuai Xu, Ravi Sandhu University of Texas at San Antonio.
Logical Model and Specification of Usage Control Xinwen Zhang, Jaehong Park Francesco Parisi-Presicce, Ravi Sandhu George Mason University.
1/25/ ISI-AIS Workshop1 TIUPAM: A Framework for Trustworthiness-centric Information Sharing Shouhuai Xu Univ. Texas at San Antonio Joint work with.
Future Directions in Role-Based Access Control Models Ravi Sandhu Co-Founder and Chief Scientist SingleSignOn.Net & Professor of Information Technology.
A Logic Specification for Usage Control Xinwen Zhang, Jaehong Park Francesco Parisi-Presicce, Ravi Sandhu George Mason University SACMAT 2004.
© 2005 Ravi Sandhu Role Usage and Activation Hierarchies (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security.
SSL Trust Pitfalls Prof. Ravi Sandhu. 2 © Ravi Sandhu 2002 THE CERTIFICATE TRIANGLE user attributepublic-key X.509 identity certificate X.509 attribute.
Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way Prof. Ravi Sandhu George Mason University
Bulk Electric System Definition Task Force Update Reliability Policy Issues Committee April 28, 2009 San Diego.
1 Cyber Insurance and IT Security Investment: Impact of Interdependent Risk Hulisi Ogut, UT-Dallas Srinivasan Raghunathan, UT-Dallas Nirup Menon, UT-Dallas.
1 Security and Trust Convergence: Attributes, Relations and Provenance Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown.
Attribute-Based Access Control Models and Beyond
TRUST in Future Internet COSTS R&D, Deployment, Incentives, Inertia, RoI, … business as usual? NEEDS Security Technologies & Socio-economic bases, …
11 World-Leading Research with Real-World Impact! RT-Based Administrative Models for Community Cyber Security Information Sharing Ravi Sandhu, Khalid Zaman.
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
11 World-Leading Research with Real-World Impact! Role and Attribute Based Collaborative Administration of Intra-Tenant Cloud IaaS (Invited Paper) Xin.
INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.
Evaluation and Testbed Development Bhavani Thuraisingham The University of Texas at Dallas Jim Massaro and Ravi Sandhu.
11 World-Leading Research with Real-World Impact! Towards Provenance and Risk-Awareness in Social Computing Yuan Cheng, Dang Nguyen, Khalid Bijon, Ram.
Information Operation across Infospheres: Assured Information Sharing Prof. Bhavani Thuraisingham Prof. Latifur Khan Prof. Murat Kantarcioglu Prof. Kevin.
On Data Provenance in Group-centric Secure Collaboration Oct. 17, 2011 CollaborateCom Jaehong Park, Dang Nguyen and Ravi Sandhu Institute for Cyber Security.
Social Computing and Incentivized Sharing. Group Members UT Dallas Murat Kantarcioglu Alain Bensoussan (UT Dallas) Nathan Berg Bhavani Thuraisingham University.
Assured Information Sharing Lifecycle A Framework for Managing the Assured Information Sharing Lifecycle Tim Finin Joint MURI Meeting 12 September 2008.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Policies September 7, 2010.
February 2009 Framework for Managing the Assured Information Sharing Lifecycle 2008 MURI project with UMBC, Purdue, U. Texas Dallas, U. Illinois, U. Texas.
Panel Session: Dependability and Security in Complex and Critical Information Systems Department of Communications and Information Engineering University.
CSCE 548 Secure Software Development Security Operations.
Preserving User Privacy from Third-party Applications in Online Social Networks Yuan Cheng, Jaehong Park and Ravi Sandhu Institute for Cyber Security University.
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
Design and Simulation of Trust Management Techniques for a Coalition Data Sharing Environment Dr.Bhavani Thuraisingham Srinivasan Iyer The University of.
UMBC AN HONORS UNIVERSITY IN MARYLAND A Framework for Managing the Assured Information Sharing Lifecycle Overview 18 September 2009 use acquir e discove.
INSTITUTE FOR CYBER SECURITY 1 Enforcement Architecture and Implementation Model for Group-Centric Information Sharing © Ravi Sandhu Ram Krishnan (George.
1 Cyber Security Major R&D Challenges Ram Krishnan Cyber Security Research Institute (CSRI) Cyber Security R&D Workshop.
INSTITUTE FOR CYBER SECURITY 1 Purpose-Centric Secure Information Sharing Ravi Sandhu Executive Director and Endowed Professor Institute for Cyber Security.
Institute for Cyber Security
Institute for Cyber Security
An Efficient Software Protection Scheme
World-Leading Research with Real-World Impact!
Cyber Security Research: Applied and Basic Combined*
Cyber Security Research: Applied and Basic Combined*
Security and Privacy in the Age of the Internet of Things:
TIUPAM: A Framework for Trustworthiness-centric Information Sharing
CSCE 813 Internet Security Fall 2012
Identity and Trust Management Platform in DICOM
Application-Centric Security
Assured Information Sharing
Cyber Security Research: A Personal Perspective
Cyber Security Research: Applied and Basic Combined*
Attribute-Based Access Control (ABAC)
Pre-K Classes in San Antonio | Pre-K San Antonio | Discovery World Learning Center
Presentation transcript:

1 TIUPAM: A Framework for Trustworthiness-centric Information Sharing Shouhuai Xu Univ. Texas at San Antonio Joint work with Qun Ni and Elisa Bertino (Purdue Univ.) Ravi Sandhu (Univ. Texas at San Antonio)

2 Goal A systematic framework for information sharing Trustworthiness-centric Identity, Usage, Provenance, and Attack Management (TIUPAM) Four supporting components: Identity management Usage management Provenance management Attack management The framework is centered at the need of trustworthiness and risk management for decision makers

3 Birds Eye View of TIUPAM Trustworthiness management Risk management Usage management (of authorized activities) Identity management (of people, organizations, and devices) Attack management (of unauthorized activities) Provenance management (of data, software, and requests) Note: 1 – trustworthiness risk in general

4 trustworthiness and risk management attack management identity management provenance management usage management Architecture of TIUPAM

1/25/ ISI-AIS Workshop5 Trustworthiness of information Trustworthiness of provenance Trustworthiness of identity Trustworthiness of usage Trustworthiness of request Trustworthiness of issuer Trustworthiness of owner Risk of (not) sharing Risk of (not) utilizing Incentives for (not) sharing Gain or loss Incentives for (not) utilizing Payoff of (not) sharing Payoff of (not) utilizing Attack model Functions as the Glue Q: How should we construct/approximate these functions?

6 Publications Shouhuai Xu, Ravi Sandhu, and Elisa Bertino, TIUPAM: A Framework for Trustworthiness-Centric Information Sharing. Proc. 3rd IFIP WG International Conference on Trust Management, Purdue University, West Lafayette, June , Qun Ni, Shouhuai Xu, Elisa Bertino, Ravi Sandhu and Weilei Han, An Access Control Language for a General Provenance Model. Proc. 6th VLDB Workshop on Secure Data Management (SDM09), Lyon, France, August 28, 2009.