The recent usage control model (UCON) is a foundation for next-generation access control models with distinguishing properties of decision continuity and attribute mutability. A usage control decision is determined by combining authorizations, obligations, and conditions, presented as UCON ABC core models by Park and Sandhu. Based on these core aspects, we develop a formal model and logical specification of UCON with an extension of Lamport's temporal logic of actions (TLA). The building blocks of this model include: (1) a set of sequences of system states based on the attributes of subjects, objects, and the system, (2) authorization predicates based on subject and object attributes, (3) usage control actions to update attributes and acces...
Usage control models provide an integration of access control, digital rights, and trust management....
Abstract. Usage control is concerned with how data is used after access to it has been granted. In e...
In Usage CONtrol (UCON) access decisions rely on mutable attributes. A reference monitor should re-e...
Recently presented usage control (UCON) has been considered as the next generation access control mo...
Access control is one of the most challenging issues facing information security. Access control is ...
Access control is one of the most challenging issues facing information security. Access control is ...
Abstract. The term usage control (UCON) is a generalization of access control to cover obligations, ...
The usage control model (UCON) is the latest major enhancement of traditional access control models....
Access control is one of the most challenging issues facing information security. Access control is ...
Usage control is a generalization of access control that also addresses how data is used after it is...
The recent usage control model (UCON) is a foundation for next-generation access control models with...
The usage control (UCON) model was introduced as a unified approach to capture a number of extension...
Part 2: Security, Access Control and Intrusion DetectionInternational audienceUsage control model (U...
Part 2: Security, Access Control and Intrusion DetectionInternational audienceUsage control model (U...
Abstract. Modern information systems require temporal and privilegeconsuming usage of digital object...
Usage control models provide an integration of access control, digital rights, and trust management....
Abstract. Usage control is concerned with how data is used after access to it has been granted. In e...
In Usage CONtrol (UCON) access decisions rely on mutable attributes. A reference monitor should re-e...
Recently presented usage control (UCON) has been considered as the next generation access control mo...
Access control is one of the most challenging issues facing information security. Access control is ...
Access control is one of the most challenging issues facing information security. Access control is ...
Abstract. The term usage control (UCON) is a generalization of access control to cover obligations, ...
The usage control model (UCON) is the latest major enhancement of traditional access control models....
Access control is one of the most challenging issues facing information security. Access control is ...
Usage control is a generalization of access control that also addresses how data is used after it is...
The recent usage control model (UCON) is a foundation for next-generation access control models with...
The usage control (UCON) model was introduced as a unified approach to capture a number of extension...
Part 2: Security, Access Control and Intrusion DetectionInternational audienceUsage control model (U...
Part 2: Security, Access Control and Intrusion DetectionInternational audienceUsage control model (U...
Abstract. Modern information systems require temporal and privilegeconsuming usage of digital object...
Usage control models provide an integration of access control, digital rights, and trust management....
Abstract. Usage control is concerned with how data is used after access to it has been granted. In e...
In Usage CONtrol (UCON) access decisions rely on mutable attributes. A reference monitor should re-e...