Skip to main content

Modelling of Integrated Trust, Governance and Access

safi.re: Information Sharing Architecture

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 182))

Abstract

We live in a world where trust relationships are becoming ever more important. The paper defines a novel modelling system of trust relationships using Binary Decision Diagrams (BDDs), and outlines how this integrates with an information sharing architecture known as safi.re (Structured Analysis and Filtering Engine). This architecture has been used on a number of information sharing projects, including within health and social care integration, and in sharing between the police and their community partners. The research aims to abstract the relationships between domains, organisations and units, into a formal definition, and then implement these as governance rules, and using the trust relationship definition, and the rules.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Fan, L., Buchanan, W., Thuemmler, C., Lo, O., Khedim, A., Uthmani, O., Lawson, A., Bell, D.: DACAR platform for eHealth services cloud. In: 2011 IEEE International Conference on Cloud Computing (CLOUD), pp. 219–226 (2011)

    Google Scholar 

  2. Fan, L., et al.: SPoC: protecting patient privacy for e-Health services in the cloud. In: The Fourth International Conference on eHealth, Telemedicine, and Social Medicine, eTELEMED 2012 (2012)

    Google Scholar 

  3. Ekonomou, E., Fan, L., Buchanan, W., Thuemmler, C.: An integrated cloud-based healthcare infrastructure. In: 2011 IEEE Third International Conference on Cloud Computing Technology and Science (CloudCom), pp. 532–536. IEEE, November 2011

    Google Scholar 

  4. Lo, O., Fan, L., Buchanan, W.J., Thuemmler, C.: Technical evaluation of an e-health platform. IADIS E-Health (2012)

    Google Scholar 

  5. US Patent Application No 13/739074, The Court of Edinburgh Napier University, Short Title: Binary Decision Diagrams, IP Title: Improved Information Sharing, Submitted: 11 Jan 2013

    Google Scholar 

  6. Roger du Mars, Mission Impossible? Data Governance takes on Big Data, Boris Evelson, BI Trends and Strategies (2012). http://cdn.ttgtmedia.com/searchBusinessAnalytics/downloads/BI_Trends_+_Strategies_July_2012.pdf. Accessed July 2012

  7. Lee, C.: Representation of switching circuits by binary decision programs. Bell Syst. Tech. J. 38, 985–999 (1959)

    Article  Google Scholar 

  8. Akers, S.B.: Binary decision diagrams. IEEE Trans. Comput. C-27(6), 509 (1978)

    Article  Google Scholar 

  9. Bryant, R.: Graph-based algorithms for boolean function manipulation. IEEE Trans. Comput. C-35(8), 677–691 (1986)

    Article  Google Scholar 

  10. Bollig, B., Wegener, I.: Improving the variable ordering of OBDDs is NP-complete. IEEE Trans. Comput. 45, 993–1002 (1996)

    Article  MATH  Google Scholar 

  11. Hazelhurst, S., Fatti, A., Henwood, A.: Binary decision diagram representations of firewall and router access lists. University of the Witwatersrand, Johannesburg, South Africa, Tech. Rep. TR-Wits-CS-1998-3 (1998)

    Google Scholar 

  12. Hazelhurst, S.: Algorithms for analysing firewall and router access lists. University of the Witwatersrand, Johannesburg, South Africa, Tech. Rep. TR-WitsCS -1999-5 (2000)

    Google Scholar 

  13. Bryant, R.E.: Symbolic boolean manipulation with ordered binary-decision diagrams. ACM Comput. Surv. 24, 293–318 (1992)

    Article  Google Scholar 

  14. US Patent Application: 13/739074

    Google Scholar 

  15. Hardt, D. (ed.): The OAuth 2.0 Authorization Framework, IEFT RFC 6749. http://tools.ietf.org/html/rfc6749.html (October 2012)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to William J. Buchanan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Buchanan, W.J. et al. (2013). Modelling of Integrated Trust, Governance and Access. In: Felici, M. (eds) Cyber Security and Privacy. CSP 2013. Communications in Computer and Information Science, vol 182. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41205-9_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-41205-9_8

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-41204-2

  • Online ISBN: 978-3-642-41205-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics