Usage control policies specify restrictions on the handling of data after access has been granted. We present the design and implementation of a framework for enforcing usage control requirements and demonstrate its genericity by instantiating it to two different levels of abstraction, those of the operating system and an enterprise service bus. This framework consists of a policy language, an automatic conversion of policies into enforcement mechanisms, and technology implemented on the grounds of trusted computing technology that makes it possible to detect tampering with the infrastructure. We show how this framework can, among other things, be used to enforce separation-of-duty policies. We provide a performance analysis
Data usage control is concerned with requirements on data after access has been granted. In order to...
In the light of mobile and ubiquitous computing, sharing sensitive information across different comp...
Usage control is concerned with how data is used after access to it has been granted. As such, it is...
Usage control policies specify restrictions on the handling of data after access has been granted. W...
Policy enforcement, or making sure that software behaves in line with a set of rules, is a problem o...
Recently proposed usage control concept and models ex-tend traditional access control models with fe...
Usage control is a generalization of access control that specifies and enforces what must or must no...
Usage control is an extension of access control that additionally defines what must and must not hap...
Usage control is an extension of access control that additionally defines what must and must not hap...
Usage control generalizes access control to what happens to data in the future. We contribute to the...
Usage control generalizes access control to what happens to data in the future. We contribute to the...
Abstract. Usage control is concerned with how data is used after access to it has been granted. In e...
Distributed usage control is concerned with how data may or may not be used after initial access to ...
Context Data usage control is an extension of access control that is concerned with how data may or ...
Distributed data usage control technology enforces obliga-tions on future data usage in a preventive...
Data usage control is concerned with requirements on data after access has been granted. In order to...
In the light of mobile and ubiquitous computing, sharing sensitive information across different comp...
Usage control is concerned with how data is used after access to it has been granted. As such, it is...
Usage control policies specify restrictions on the handling of data after access has been granted. W...
Policy enforcement, or making sure that software behaves in line with a set of rules, is a problem o...
Recently proposed usage control concept and models ex-tend traditional access control models with fe...
Usage control is a generalization of access control that specifies and enforces what must or must no...
Usage control is an extension of access control that additionally defines what must and must not hap...
Usage control is an extension of access control that additionally defines what must and must not hap...
Usage control generalizes access control to what happens to data in the future. We contribute to the...
Usage control generalizes access control to what happens to data in the future. We contribute to the...
Abstract. Usage control is concerned with how data is used after access to it has been granted. In e...
Distributed usage control is concerned with how data may or may not be used after initial access to ...
Context Data usage control is an extension of access control that is concerned with how data may or ...
Distributed data usage control technology enforces obliga-tions on future data usage in a preventive...
Data usage control is concerned with requirements on data after access has been granted. In order to...
In the light of mobile and ubiquitous computing, sharing sensitive information across different comp...
Usage control is concerned with how data is used after access to it has been granted. As such, it is...