当前位置: X-MOL 学术IEEE Trans. Knowl. Data. Eng. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Sticky Policies: A Survey
IEEE Transactions on Knowledge and Data Engineering ( IF 8.9 ) Pub Date : 2020-12-01 , DOI: 10.1109/tkde.2019.2936353
Daniele Miorandi , Alessandra Rizzardi , Sabrina Sicari , Alberto Coen-Porisini

In the digital age, where the Internet connects things across the globe and individuals are constantly online, data security and privacy are becoming key drivers (and barriers) of change for adoption of innovative solutions. Traditional approaches, whereby communication links are secured by means of encryption, and access control is run in a static way by a centralized authority, are showing their limits when applied to massive-scale, interconnected and distributed systems. Regulations, while still fragmented, are moving to adapt to changes in technology and society, with the aim to protect confidential information by governments, businesses, and individual citizens. In this landscape, proper mechanisms should be defined to allow a strict control over the data life-cycle and to guarantee the privacy and the application of specific regulations on personal information's disclosure, usage and access. Sticky policies represent one approach to improve owners’ control over their data. In such an approach, machine-readable policies are attached to data. They are called 'sticky’ in that they travel together with data, as data travels across multiple administrative domains. In this article we survey the state-of-the-art in sticky policies, discussing limitations, open issues, applications and research challenges, with a specific focus on their applicability to Internet of Things, cloud computing, and Content Centric Networking.

中文翻译:

粘性政策:一项调查

在数字时代,互联网连接全球各地的事物,个人始终在线,数据安全和隐私正在成为采用创新解决方案的关键驱动因素(和障碍)。传统方法通过加密保护通信链接,并由中央机构以静态方式运行访问控制,当应用于大规模、互连和分布式系统时,它们显示出其局限性。法规虽然仍然支离破碎,但正在努力适应技术和社会的变化,旨在保护政府、企业和个人公民的机密信息。在这风景中,应定义适当的机制,以允许对数据生命周期进行严格控制,并保证隐私和适用于个人信息披露、使用和访问的特定法规。粘性策略代表了一种改善所有者对其数据控制的方法。在这种方法中,机器可读的策略被附加到数据上。它们被称为“粘性”,因为它们与数据一起传输,因为数据跨多个管理域传输。在本文中,我们调查了粘性政策的最新技术,讨论了局限性、开放性问题、应用程序和研究挑战,特别关注它们对物联网、云计算和以内容为中心的网络的适用性。粘性策略代表了一种改善所有者对其数据控制的方法。在这种方法中,机器可读的策略被附加到数据上。它们被称为“粘性”,因为它们与数据一起传输,因为数据跨多个管理域传输。在本文中,我们调查了粘性政策的最新技术,讨论了局限性、开放性问题、应用程序和研究挑战,特别关注它们对物联网、云计算和以内容为中心的网络的适用性。粘性策略代表了一种改善所有者对其数据控制的方法。在这种方法中,机器可读的策略被附加到数据上。它们被称为“粘性”,因为它们与数据一起传输,因为数据跨多个管理域传输。在本文中,我们调查了粘性政策的最新技术,讨论了局限性、开放性问题、应用程序和研究挑战,特别关注它们对物联网、云计算和以内容为中心的网络的适用性。
更新日期:2020-12-01
down
wechat
bug