Abstract—Data usage control is concerned with requirements on data after access has been granted. In order to enforce usage control requirements, it is necessary to track the different representations that the data may take (among others, file, window content, network packet). These representations exist at different layers of abstraction. As a consequence, in order to enforce usage control requirements, multiple data flow tracking and usage control enforcement monitors must exist, one at each layer. If a new representation is created at some layer of abstraction, e.g., if a cache file is created for a picture after downloading it with a browser, then the initiating layer (in the example, the browser) must notify the layer at which the new ...
Virtualization is an emerging technology which provides organizations with a wide range of benefits....
Network Function Virtualization (NFV) is a virtual network model, the goal of which is a cost-effici...
This dissertation describes monitoring methods to achieve both security and reliability in virtualiz...
Data usage control is concerned with requirements on data after access has been granted. In order to...
Usage control is an extension of access control that additionally defines what must and must not hap...
Usage control is an extension of access control that additionally defines what must and must not hap...
Computer systems play an increasingly prominent role in our daily lives. Interacting with these syst...
Abstract—Usage control policies specify restrictions on the handling of data after access has been g...
In this work, we show how the abstraction layer created by a hypervisor, or virtual machine monitor,...
Usage control generalizes access control to what happens to data in the future. We contribute to the...
Usage control generalizes access control to what happens to data in the future. We contribute to the...
One of the central security concerns in managing an organization is protecting the flow of sensitive...
Abstract. Usage control is concerned with what happens to data af-ter access has been granted. In th...
In data administration resource sharing has a crucial liability. At the same time we should be consc...
The distributiveness and heterogeneity of today’s systems of systems, such as the Internet of Things...
Virtualization is an emerging technology which provides organizations with a wide range of benefits....
Network Function Virtualization (NFV) is a virtual network model, the goal of which is a cost-effici...
This dissertation describes monitoring methods to achieve both security and reliability in virtualiz...
Data usage control is concerned with requirements on data after access has been granted. In order to...
Usage control is an extension of access control that additionally defines what must and must not hap...
Usage control is an extension of access control that additionally defines what must and must not hap...
Computer systems play an increasingly prominent role in our daily lives. Interacting with these syst...
Abstract—Usage control policies specify restrictions on the handling of data after access has been g...
In this work, we show how the abstraction layer created by a hypervisor, or virtual machine monitor,...
Usage control generalizes access control to what happens to data in the future. We contribute to the...
Usage control generalizes access control to what happens to data in the future. We contribute to the...
One of the central security concerns in managing an organization is protecting the flow of sensitive...
Abstract. Usage control is concerned with what happens to data af-ter access has been granted. In th...
In data administration resource sharing has a crucial liability. At the same time we should be consc...
The distributiveness and heterogeneity of today’s systems of systems, such as the Internet of Things...
Virtualization is an emerging technology which provides organizations with a wide range of benefits....
Network Function Virtualization (NFV) is a virtual network model, the goal of which is a cost-effici...
This dissertation describes monitoring methods to achieve both security and reliability in virtualiz...