Abstract—Usage control is a generalization of access control that also addresses how data is handled after it is released. Usage control requirements are specified in policies. We present tool support for the following analysis problems. Is a policy consistent, i.e., satisfiable? Is an abstractly specified usage control mechanism capable of enforcing a given policy? Can we configure such a mechanism by analyzing respective policies? In the context of propagation, where upon re-distribution of data duties may only be increased and rights decreased, can we check if a policy is only strengthened in this sense? — Our solution uses a model checker as theorem prover and is based on a translation of usage control policies into a Linear Time Logic...
We explain how a parameterized model checking technique can be exploited to mechanize the analysis o...
In existing usage control policy frameworks, policies consisting of authorizations and obligations a...
Abstract—Usage control policies specify restrictions on the handling of data after access has been g...
Usage control is a generalization of access control that also addresses how data is handled after it...
Abstract. Usage control is concerned with how data is used after access to it has been granted. In e...
Usage control is a generalization of access control that also addresses how data is used after it is...
Usage control is a generalization of access control that specifies and enforces what must or must no...
AbstractUsage control is a generalization of access control that also addresses how data is handled ...
We present a formal (model-based) approach to de-scribing and analysing access control policies. Thi...
Abstract. Access-control policies have grown from simple matrices to non-trivial specifications writ...
Usage control is a generalization of access control that also addresses how data is handled after it...
The recent usage control model (UCON) is a foundation for next-generation access control models with...
Usage control is concerned with how data is used after access to it has been granted. As such, it is...
International audienceAccess control policies are set of facts and rules that determine whether an a...
Access control is the traditional center of gravity of computer security [1]. People specify access ...
We explain how a parameterized model checking technique can be exploited to mechanize the analysis o...
In existing usage control policy frameworks, policies consisting of authorizations and obligations a...
Abstract—Usage control policies specify restrictions on the handling of data after access has been g...
Usage control is a generalization of access control that also addresses how data is handled after it...
Abstract. Usage control is concerned with how data is used after access to it has been granted. In e...
Usage control is a generalization of access control that also addresses how data is used after it is...
Usage control is a generalization of access control that specifies and enforces what must or must no...
AbstractUsage control is a generalization of access control that also addresses how data is handled ...
We present a formal (model-based) approach to de-scribing and analysing access control policies. Thi...
Abstract. Access-control policies have grown from simple matrices to non-trivial specifications writ...
Usage control is a generalization of access control that also addresses how data is handled after it...
The recent usage control model (UCON) is a foundation for next-generation access control models with...
Usage control is concerned with how data is used after access to it has been granted. As such, it is...
International audienceAccess control policies are set of facts and rules that determine whether an a...
Access control is the traditional center of gravity of computer security [1]. People specify access ...
We explain how a parameterized model checking technique can be exploited to mechanize the analysis o...
In existing usage control policy frameworks, policies consisting of authorizations and obligations a...
Abstract—Usage control policies specify restrictions on the handling of data after access has been g...