AbstractWith more and more personal data being collected and stored by service providers, there is an increasing need to ensure that their usage is compliant with privacy regulations and user preferences. We consider the specific scenario where promised usage is specified as metric temporal logic policies, and these policies can be verified against the database usage logs. Given the vast amount of data being collected, scalability is very important. In this work, we show how such usage monitoring can be performed in a distributed fashion for an expressive set of policies. Experimental results are given for a real-life use case to show the genericness and scalability of the results
Abstract—Usage control policies specify restrictions on the handling of data after access has been g...
Usage control is a generalization of access control that also addresses how data is handled after it...
Abstract. It is a growing concern of companies and end users whether the agents of an IT system, i.e...
We have previously presented a monitoring algorithm for compliance checking of policies formalized i...
Abstract. Data usage control provides mechanisms for data owners to remain in control over how their...
Abstract. Distributed data usage control enables data owners to constrain how their data is used by ...
Abstract—IT systems manage increasing amounts of sensitive data and there is a growing concern that ...
Distributed data usage control technology enforces obliga-tions on future data usage in a preventive...
Distributed usage control is concerned with how data may or may not be used after initial access to ...
Abstract: Usage control is concerned with how data is used after access has been granted. Enforcemen...
Context Data usage control is an extension of access control that is concerned with how data may or ...
The organization and planning of services (e.g. shopping facilities, infrastructure) requires quanti...
Distributed usage control is concerned with how data may or may not be used after initial access to ...
Usage control is concerned with how data is used after access to it has been granted. Respective enf...
Abstract—Despite the increasing adoption of cloud-based ser-vices, concerns regarding the proper fut...
Abstract—Usage control policies specify restrictions on the handling of data after access has been g...
Usage control is a generalization of access control that also addresses how data is handled after it...
Abstract. It is a growing concern of companies and end users whether the agents of an IT system, i.e...
We have previously presented a monitoring algorithm for compliance checking of policies formalized i...
Abstract. Data usage control provides mechanisms for data owners to remain in control over how their...
Abstract. Distributed data usage control enables data owners to constrain how their data is used by ...
Abstract—IT systems manage increasing amounts of sensitive data and there is a growing concern that ...
Distributed data usage control technology enforces obliga-tions on future data usage in a preventive...
Distributed usage control is concerned with how data may or may not be used after initial access to ...
Abstract: Usage control is concerned with how data is used after access has been granted. Enforcemen...
Context Data usage control is an extension of access control that is concerned with how data may or ...
The organization and planning of services (e.g. shopping facilities, infrastructure) requires quanti...
Distributed usage control is concerned with how data may or may not be used after initial access to ...
Usage control is concerned with how data is used after access to it has been granted. Respective enf...
Abstract—Despite the increasing adoption of cloud-based ser-vices, concerns regarding the proper fut...
Abstract—Usage control policies specify restrictions on the handling of data after access has been g...
Usage control is a generalization of access control that also addresses how data is handled after it...
Abstract. It is a growing concern of companies and end users whether the agents of an IT system, i.e...