Access control is one of the most challenging issues facing information security. Access control is defined as, the ability to permit or deny access to a particular computational resource or digital information by an unauthorized user or subject. The concept of usage control (UCON) has been introduced as a unified approach to capture a number of extensions for access control models and systems. In UCON, an access decision is determined by three factors: authorizations, obligations and conditions. Attribute mutability and decision continuity are two distinct characteristics introduced by UCON for the first time. An observation of UCON components indicates that, the components are predefined and static. In this paper, we propose a new and fle...
Part 2: Security, Access Control and Intrusion DetectionInternational audienceUsage control model (U...
Abstract. Modern information systems require temporal and privilegeconsuming usage of digital object...
UCON is an emerging access control framework that lacks an administration model. In this paper we de...
Access control is one of the most challenging issues facing information security. Access control is ...
Access control is one of the most challenging issues facing information security. Access control is ...
The recent usage control model (UCON) is a foundation for next-generation access control models with...
Abstract. The term usage control (UCON) is a generalization of access control to cover obligations, ...
Recently presented usage control (UCON) has been considered as the next generation access control mo...
Protecting access to digital resources is one of the fundamental problems recognized in computer sec...
The usage control model (UCON) is the latest major enhancement of traditional access control models....
The security related characteristics of entities, the contextual information that describes them and...
Usage CONtrol (UCON) model is the latest major enhance- ment of the traditional access control mode...
In Usage CONtrol (UCON) access decisions rely on mutable attributes. A reference monitor should re-e...
The usage control (UCON) model was introduced as a unified approach to capture a number of extension...
Part 2: Security, Access Control and Intrusion DetectionInternational audienceUsage control model (U...
Part 2: Security, Access Control and Intrusion DetectionInternational audienceUsage control model (U...
Abstract. Modern information systems require temporal and privilegeconsuming usage of digital object...
UCON is an emerging access control framework that lacks an administration model. In this paper we de...
Access control is one of the most challenging issues facing information security. Access control is ...
Access control is one of the most challenging issues facing information security. Access control is ...
The recent usage control model (UCON) is a foundation for next-generation access control models with...
Abstract. The term usage control (UCON) is a generalization of access control to cover obligations, ...
Recently presented usage control (UCON) has been considered as the next generation access control mo...
Protecting access to digital resources is one of the fundamental problems recognized in computer sec...
The usage control model (UCON) is the latest major enhancement of traditional access control models....
The security related characteristics of entities, the contextual information that describes them and...
Usage CONtrol (UCON) model is the latest major enhance- ment of the traditional access control mode...
In Usage CONtrol (UCON) access decisions rely on mutable attributes. A reference monitor should re-e...
The usage control (UCON) model was introduced as a unified approach to capture a number of extension...
Part 2: Security, Access Control and Intrusion DetectionInternational audienceUsage control model (U...
Part 2: Security, Access Control and Intrusion DetectionInternational audienceUsage control model (U...
Abstract. Modern information systems require temporal and privilegeconsuming usage of digital object...
UCON is an emerging access control framework that lacks an administration model. In this paper we de...