Model-based usage control policy derivation

P Kumari, A Pretschner - … Symposium on Engineering Secure Software and …, 2013 - Springer
Usage control is concerned with how data is used after access to it has been granted. In
existing usage control enforcement frameworks, policies are assumed to exist and the …

Model-based policy derivation for usage control

P Kumari - 2015 - mediatum.ub.tum.de
Usage control concerns how data is used post-access. In existing work on usage control
enforcement, policies are assumed to exist at the implementation-level: their derivation from …

Formal model and policy specification of usage control

X Zhang, F Parisi-Presicce, R Sandhu… - ACM Transactions on …, 2005 - dl.acm.org
The recent usage control model (UCON) is a foundation for next-generation access control
models with distinguishing properties of decision continuity and attribute mutability. A usage …

Deriving implementation-level policies for usage control enforcement

P Kumari, A Pretschner - Proceedings of the second ACM conference on …, 2012 - dl.acm.org
Usage control is concerned with how data is used after access to it has been granted. As
such, it is particularly relevant to end users who own the data. System implementations of …

Dynamic analysis of usage control policies

Y Elrakaiby, J Pang - 2014 11th International Conference on …, 2014 - ieeexplore.ieee.org
Usage control extends access control by enabling the specification of requirements that
should be satisfied before, while and after access. To ensure that the deployment of usage …

Representation-independent data usage control

A Pretschner, E Lovat, M Büchler - International Workshop on Data Privacy …, 2011 - Springer
Usage control is concerned with what happens to data after access has been granted. In the
literature, usage control models have been defined on the grounds of events that, somehow …

[PDF][PDF] Application specific usage control implementation verification

PV Rajkumar, SK Ghosh, P Dasgupta - International Journal of …, 2009 - academia.edu
Usage control is a comprehensive access control model developed to cater the security
needs of the wide range of applications. Formal specification of the core usage control …

Formal analyses of usage control policies

A Pretschner, J Rüesch, C Schaefer… - … Reliability and Security, 2009 - ieeexplore.ieee.org
Usage control is a generalization of access control that also addresses how data is handled
after it is released. Usage control requirements are specified in policies. We present tool …

Model-based specification and refinement of usage control policies

R Neisse, J Doerr - … Annual Conference on Privacy, Security and …, 2013 - ieeexplore.ieee.org
In existing usage control policy frameworks, policies consisting of authorizations and
obligations are specified at a low level of abstraction. As a consequence, these policy …

Mechanisms for usage control

A Pretschner, M Hilty, D Basin, C Schaefer… - Proceedings of the 2008 …, 2008 - dl.acm.org
Mechanisms for usage control Page 1 Mechanisms for Usage Control A. Pretschner, M. Hilty,
D. Basin Information Security, ETH Zurich, Switzerland {pretscha,hiltym,basin}@inf.ethz.ch C …