Cardiff University | Prifysgol Caerdydd ORCA
Online Research @ Cardiff 
WelshClear Cookie - decide language by browser settings

Self protecting data for de-perimeterised information sharing

Burnap, Peter ORCID: and Hilton, Jeremy Charles 2009. Self protecting data for de-perimeterised information sharing. Presented at: Third International Conference on Digital Society ICDS '09, Cancun, Mexico, 1-7 February 2009. Digital Society, 2009. ICDS '09. Third International Conference on. Third International Conference on Digital Society. IEEE, pp. 65-70. 10.1109/ICDS.2009.41

[thumbnail of 04782852.pdf]
PDF - Accepted Post-Print Version
Download (276kB) | Preview


The emergence of high-speed networks, Grid Computing, Service-Oriented Architectures, and an ever increasing ambient connection to mobile Internet has enabled an underpinning infrastructure for the development of dynamically formed, collaborative working groups known as Virtual Organisations (VOs). VOs provide strong motivation for investigation into the infrastructure, and in particular the security necessary to protect the information and resources shared within a VO, both while resident on local machines and when allowed to move beyond the secure boundary of a local organisational network perimeter and into the realm of the distributed VO. Traditional access control systems are perimeter- centric, meaning they apply the controls to both internal and external requests for access to information within or at the perimeter of their information system. • This paper presents the initial results of the JISC funded SPIDER project, being led by Cardiff University. Through case based example, the research investigates the limitations to granularity and persistent control over information when using the perimeter- centric approach in a collaborative working environment.

Item Type: Conference or Workshop Item (Paper)
Date Type: Publication
Status: Published
Schools: Computer Science & Informatics
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Uncontrolled Keywords: Collborative Working, DRM, Data Level Security, Distributed, Information Security
Publisher: IEEE
ISBN: 9781424435506
Funders: JISC
Date of First Compliant Deposit: 30 March 2016
Last Modified: 24 Oct 2022 11:08

Citation Data

Cited 12 times in Scopus. View in Scopus. Powered By Scopus® Data

Actions (repository staff only)

Edit Item Edit Item


Downloads per month over past year

View more statistics