Abstract
Using a server-side architecture to connect specialized enforcement mechanisms with usage control requirements and policies.
- Backes, M., Pfitzmann, B., and Schunter, M. A toolkit for managing enterprise privacy policies. In Proceedings of ESORICS (2003), 162--180.Google ScholarCross Ref
- Bettini, C., Jajodia, S., Wang, X.S. and Wijesekera, D. Provisions and obligations in policy rule management. J. Network and System Mgmt. 11, 3 (2003), 351--372. Google ScholarDigital Library
- Hilty, M., Basin, D., and Pretschner, A. On obligations. In Proceedings of ESORICS (2005), 98--117. Google ScholarDigital Library
- Ianelli, R., Ed. Open Digital Rights Language (ODRL); odrl.net.Google Scholar
- Jajodia, S., Kudo, M. and Subrahmanian, V. Provisional authorizations. In E-Commerce Security and Privacy, Kluwer, 2001, 133--159.Google Scholar
- Liu, Q., Safavi-Naini, R. and Sheppard, N. Digital rights management for content distribution. In Proceedings of the Australasian Information Security Workshop (2003), 49--58. Google ScholarDigital Library
- OASIS. eXtensible Access Control Markup Language (XACML), 2005. V 2.0.Google Scholar
- Park, J. and Sandhu, R. The UCON ABC usage control model. ACM Transactions on Information and Systems Security 7 (2004), 128--174. . Google ScholarDigital Library
- Smith, S.W. Trusted Computing. Springer, 2005.Google Scholar
Index Terms
- Distributed usage control
Recommendations
Data usage control enforcement in distributed systems
CODASPY '13: Proceedings of the third ACM conference on Data and application security and privacyDistributed usage control is concerned with how data may or may not be used in distributed system environments after initial access has been granted. If data flows through a distributed system, there exist multiple copies of the data on different client ...
Data Usage Control for Distributed Systems
Data usage control enables data owners to enforce policies over how their data may be used after they have been released and accessed. We address distributed aspects of this problem, which arise if the protected data reside within multiple systems. We ...
Decentralized Distributed Data Usage Control
Proceedings of the 13th International Conference on Cryptology and Network Security - Volume 8813Data usage control provides mechanisms for data owners to remain in control over how their data is used after it is has been shared. Many data usage policies can only be enforced on a global scale, as they refer to data usage events happening within ...
Comments