Research Commons
      • Browse 
        • Communities & Collections
        • Titles
        • Authors
        • By Issue Date
        • Subjects
        • Types
        • Series
      • Help 
        • About
        • Collection Policy
        • OA Mandate Guidelines
        • Guidelines FAQ
        • Contact Us
      • My Account 
        • Sign In
        • Register
      View Item 
      •   Research Commons
      • University of Waikato Research
      • Computing and Mathematical Sciences
      • Computing and Mathematical Sciences Papers
      • View Item
      •   Research Commons
      • University of Waikato Research
      • Computing and Mathematical Sciences
      • Computing and Mathematical Sciences Papers
      • View Item
      JavaScript is disabled for your browser. Some features of this site may not work without it.

      Unified model for data security - A position paper

      Akram, Raja Naeem; Ko, Ryan K.L.
      Thumbnail
      Files
      Unified Model for Data Security - A Position Paper.pdf
      Accepted version, 263.8Kb
      DOI
       10.1109/TrustCom.2014.110
      Find in your library  
      Citation
      Export citation
      Akram, R. N., & Ko, R. K. L. (2015). Unified model for data security - A position paper. In Proc 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (pp. 831–839). New York, USA: Institute of Electrical and Electronics Engineers Inc. http://doi.org/10.1109/TrustCom.2014.110
      Permanent Research Commons link: https://hdl.handle.net/10289/9282
      Abstract
      One of the most crucial components of modern Information Technology (IT) systems is data. It can be argued that the majority of IT systems are built to collect, store, modify, communicate and use data, enabling different data stakeholders to access and use it to achieve different business objectives. The confidentiality, integrity, availability, audit ability, privacy, and quality of the data is of paramount concern for end-users ranging from ordinary consumers to multi-national companies. Over the course of time, different frameworks have been proposed and deployed to provide data security. Many of these previous paradigms were specific to particular domains such as military or media content providers, while in other cases they were generic to different verticals within an industry. There is a much needed push for a holistic approach to data security instead of the current bespoke approaches. The age of the Internet has witnessed an increased ease of sharing data with or without authorisation. These scenarios have created new challenges for traditional data security. In this paper, we study the evolution of data security from the perspective of past proposed frameworks, and present a novel Unified Model for Data Security (UMDS). The discussed UMDS reduces the friction from several cross-domain challenges, and has the functionality to possibly provide comprehensive data security to data owners and privileged users.
      Date
      2015-01-15
      Type
      Conference Contribution
      Publisher
      Institute of Electrical and Electronics Engineers Inc.
      Rights
      This is author's accept version of an article published in Proceedings of 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. © 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
      Collections
      • Computing and Mathematical Sciences Papers [1441]
      Show full item record  

      Usage

      Downloads, last 12 months
      74
       
       
       

      Usage Statistics

      For this itemFor all of Research Commons

      The University of Waikato - Te Whare Wānanga o WaikatoFeedback and RequestsCopyright and Legal Statement