ITrust workshop Glasgow 2-4 Sep 2002

bullet1 1st breakout session: architectures

bullet2 ?, U of Milano - Dissemination of information - uses XML

bullet3 Author-X

XML access control

Java based, for XML data sources

Credential-based access control

Secure dissemination and update

bullet3 Access control policies

Set and document-oriented

Postive and negative

Different granularity levels

Controlled propagation of access rights

Credential based qualifications

bullet3 Credentials

Subject is predicate of combined values

bullet3 Question   Certainty of computational tractability?

bullet3 Push dissemination mode


bullet3 Certainty that complete information has been provided

Protects against some selective denial of service attacks?

bullet3 Question   XML queries over encrypted data?