By Topic

Optimizing Secure Collaboration Transactions for Modern Information Systems

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Whittaker, R. ; Sch. of Comput. & Inf. Sci., Florida Int. Univ., Miami, FL ; Argote-Garcia, G. ; Clarke, P.J. ; Ege, R.K.

The issue of securing a collaboration within an information system is often addressed from the viewpoint of establishing a security policy that grants access to data by what role an individual has or the permissions that are attached to the underlying data. These methods are well suited for transactions where the concern is to secure the data during and after a collaboration. In the situation where the concern is to release the data without any security control after the release, these methods are unproductive. In such an environment the initial disclosure of data is crucial. In this paper we present the Optimal Data Security Module that addresses the need for an individual to select a minimal data set for a single collaboration transaction that results in the greatest return when collaborating with other entities within an information system. Therefore an individual could minimize the risk of sharing his/her data and maximize the reward when collaborating with other parties.

Published in:

Systems, 2008. ICONS 08. Third International Conference on

Date of Conference:

13-18 April 2008