ABSTRACT
Distributed usage control is concerned with how data may or may not be used after initial access to it has been granted and is therefore particularly important in distributed system environments. We present an application- and application-protocol-independent infrastructure that allows for the enforcement of usage control policies in a distributed environment. We instantiate the infrastructure for transferring files using FTP and for a scenario where smart meters are connected to a Facebook application.
- M. Harvan and A. Pretschner. State-Based Usage Control Enforcement with Data Flow Tracking using System Call Interposition. In Proc. 3rd International Conference on Network and System Security, pages 373--380, Oct. 2009. Google ScholarDigital Library
- P. Kumari, F. Kelbert, and A. Pretschner. Data Protection in Heterogeneous Distributed Systems: A Smart Meter Example. In Proc. Workshop on Dependable Software for Critical Infrastructures. GI Lecture Notes in Informatics, Oct. 2011.Google Scholar
- P. Kumari and A. Pretschner. Deriving Implementation-level Policies for Usage Control Enforcement. In Proc. 2nd ACM Conference on Data and Application Security and Privacy, pages 83--94, Feb. 2012. Google ScholarDigital Library
- A. Pretschner, M. Hilty, and D. Basin. Distributed Usage Control. Communications of the ACM, pages 39--44, Sept. 2006. Google ScholarDigital Library
- A. Pretschner, M. Hilty, D. Basin, C. Schaefer, and T. Walter. Mechanisms for Usage Control. In Proc. 2008 ACM Symposium on Information, Computer and Communications Security, pages 240--244, Mar. 2008. Google ScholarDigital Library
- A. Pretschner, E. Lovat, and M. Büchler. Representation-Independent Data Usage Control. In Data Privacy Management and Autonomous Spontaneus Security, volume 7122 of Lecture Notes in Computer Science, pages 122--140, 2012. Google ScholarDigital Library
- N. Provos. Improving Host Security with System Call Policies. In Proc. 12th USENIX Security Symposium, June 2003. Google ScholarDigital Library
- R. Sandhu and J. Park. Usage Control: A Vision for Next Generation Access Control. In Computer Network Security, volume 2776 of Lecture Notes in Computer Science, pages 17--31. 2003.Google ScholarCross Ref
- D. Winer. XML-RPC, http://xmlrpc.scripting.com/, 1998.Google Scholar
Recommendations
Data usage control enforcement in distributed systems
CODASPY '13: Proceedings of the third ACM conference on Data and application security and privacyDistributed usage control is concerned with how data may or may not be used in distributed system environments after initial access has been granted. If data flows through a distributed system, there exist multiple copies of the data on different client ...
Data Usage Control for Distributed Systems
Data usage control enables data owners to enforce policies over how their data may be used after they have been released and accessed. We address distributed aspects of this problem, which arise if the protected data reside within multiple systems. We ...
The UCONABC usage control model
In this paper, we introduce the family of UCONABC models for usage control (UCON), which integrate Authorizations (A), oBligations (B), and Conditions (C). We call these core models because they address the essence of UCON, leaving administration, ...
Comments