Science of design for societal-scale cyber-physical systems: challenges and opportunities

J Sztipanovits, X Koutsoukos, G Karsai… - Cyber-Physical …, 2019 - Taylor & Francis
Emerging industrial platforms such as the Internet of Things (IoT), Industrial Internet (II) in the
US and Industrie 4.0 in Europe have tremendously accelerated the development of new …

Data usage control for distributed systems

F Kelbert, A Pretschner - ACM Transactions on Privacy and Security …, 2018 - dl.acm.org
Data usage control enables data owners to enforce policies over how their data may be
used after they have been released and accessed. We address distributed aspects of this …

Model-based specification and refinement of usage control policies

R Neisse, J Doerr - … Annual Conference on Privacy, Security and …, 2013 - ieeexplore.ieee.org
In existing usage control policy frameworks, policies consisting of authorizations and
obligations are specified at a low level of abstraction. As a consequence, these policy …

Decentralized distributed data usage control

F Kelbert, A Pretschner - … Conference on Cryptology and Network Security, 2014 - Springer
Data usage control provides mechanisms for data owners to remain in control over how their
data is used after it is has been shared. Many data usage policies can only be enforced on a …

Cross-layer data-centric usage control

E Lovat - 2015 - mediatum.ub.tum.de
Usage control (UC) specifies what happens to data after access to it has been granted.
Within the system, data (eg “a picture”) exists in form of various representations, possibly …

A unique temporary bond solution based on a polymeric material tacky at room temperature and highly thermally resistant application extension from 3D-SIC to FO …

A Phommahaxay, G Potoms, J Bertheau… - 2017 IEEE 67th …, 2017 - ieeexplore.ieee.org
Among the technological developments pushed by the adoption of Through Silicon Vias and
3D Stacked IC technologies, wafer thinning on a temporary carrier has become a critical …

Enhancing data flow tracking for data usage control

A Fromm - 2020 - mediatum.ub.tum.de
Access Control (AC) ist die erste Wahl von Dateneignern um ihre Daten vor unautorisierten
Zugriffen zu schützen, und so den Zugriff nur auf autorisierte Datenkonsumenten zu …

Compliance monitoring of third-party applications in online social networks

F Kelbert, A Fromm - 2016 IEEE Security and Privacy …, 2016 - ieeexplore.ieee.org
With the widespread adoption of Online Social Networks (OSNs), users increasingly also
use corresponding third-party applications (TPAs), such as social games and applications …

[PDF][PDF] Achieving accountability with distributed data usage control technology

A Pretschner - 2nd International Workshop on Accountability …, 2014 - mediatum.ub.tum.de
Distributed data usage control technology enforces obligations on future data usage in a
preventive or a detective manner. The goal of preventive enforcement is to make sure that a …

Data usage control for the cloud

F Kelbert - 2013 13th IEEE/ACM International Symposium on …, 2013 - ieeexplore.ieee.org
Despite the increasing adoption of cloud-based services, concerns regarding the proper
future usage and storage of data given to such services remain: Once sensitive data has …