Usage control is concerned with how data is used after access to it has been granted. Respective enforcement mechanisms need to be implemented at different layers of abstraction in order to monitor or control data at and across all these layers. We present a usage control enforcement mechanism at the application layer. It is implemented for a common web browser and, as an example, is used to control data in a social network application. With the help of the mechanism, a data owner can, on the grounds of assigned trust values, prevent data from being printed, saved, copied&pasted, etc., after this data has been downloaded by other users
Abstract—Usage control policies specify restrictions on the handling of data after access has been g...
Abstract. Usage control is concerned with what happens to data af-ter access has been granted. In th...
Topology-based access control is today a de-facto standard for protecting resources in On-line Socia...
Abstract: Usage control is concerned with how data is used after access has been granted. Enforcemen...
Distributed usage control is concerned with how data may or may not be used after initial access to ...
Usage control is an extension of access control that additionally defines what must and must not hap...
Usage control is an extension of access control that additionally defines what must and must not hap...
Distributed usage control is concerned with how data may or may not be used after initial access to ...
Context Data usage control is an extension of access control that is concerned with how data may or ...
Distributed data usage control technology enforces obliga-tions on future data usage in a preventive...
Abstract—Despite the increasing adoption of cloud-based ser-vices, concerns regarding the proper fut...
Abstract. Data usage control provides mechanisms for data owners to remain in control over how their...
Abstract. Distributed data usage control enables data owners to constrain how their data is used by ...
Abstract. Usage control generalizes access control to what happens to data in the future (“delete af...
In this article, we propose an access control mechanism for Web-based social networks, which adopts ...
Abstract—Usage control policies specify restrictions on the handling of data after access has been g...
Abstract. Usage control is concerned with what happens to data af-ter access has been granted. In th...
Topology-based access control is today a de-facto standard for protecting resources in On-line Socia...
Abstract: Usage control is concerned with how data is used after access has been granted. Enforcemen...
Distributed usage control is concerned with how data may or may not be used after initial access to ...
Usage control is an extension of access control that additionally defines what must and must not hap...
Usage control is an extension of access control that additionally defines what must and must not hap...
Distributed usage control is concerned with how data may or may not be used after initial access to ...
Context Data usage control is an extension of access control that is concerned with how data may or ...
Distributed data usage control technology enforces obliga-tions on future data usage in a preventive...
Abstract—Despite the increasing adoption of cloud-based ser-vices, concerns regarding the proper fut...
Abstract. Data usage control provides mechanisms for data owners to remain in control over how their...
Abstract. Distributed data usage control enables data owners to constrain how their data is used by ...
Abstract. Usage control generalizes access control to what happens to data in the future (“delete af...
In this article, we propose an access control mechanism for Web-based social networks, which adopts ...
Abstract—Usage control policies specify restrictions on the handling of data after access has been g...
Abstract. Usage control is concerned with what happens to data af-ter access has been granted. In th...
Topology-based access control is today a de-facto standard for protecting resources in On-line Socia...