Talks and Poster Presentations (with Proceedings-Entry):
M. Salfer, S. Wohlgemuth, S. Schrittwieser, B. Bauer, I. Echizen:
"Data Provenance with Watermarks for Usage Control Monitors at Disaster Recovery";
Talk: International Workshop on Resilience and ICT for Secure Open Cities 2011,
2011-10-19; in: "In Proceedings of the 4th IEEE International Conferences on Cyber, Physical and Social Computing",
Security restrictions are often lifted for faster disaster recovery. This grants access to external services for providing at least basic infrastructure operation, but puts data at risk. Usage control monitors are supposed to avoid data abuse by watching every movement, yet they appear unfit for a fast roll out and prone to low-level attacks and steganographic tunneling. We propose supplementing monitors with watermarkers and also sketch out an algorithm for it to integrate provenance information into data itself. So, an auditor can inspect such watermarks, query involved monitors, and tell a legitimate from an illegitimate usage more easily.
Watermarking, Tunneling, Data Provenance, Resilience
Electronic version of the publication:
Created from the Publication Database of the Vienna University of Technology.