Usage control concerns how data is used post-access. In existing work on usage control enforcement, policies are assumed to exist at the implementation-level: their derivation from …
X Zhang, F Parisi-Presicce, R Sandhu… - ACM Transactions on …, 2005 - dl.acm.org
The recent usage control model (UCON) is a foundation for next-generation access control models with distinguishing properties of decision continuity and attribute mutability. A usage …
P Kumari, A Pretschner - Proceedings of the second ACM conference on …, 2012 - dl.acm.org
Usage control is concerned with how data is used after access to it has been granted. As such, it is particularly relevant to end users who own the data. System implementations of …
Y Elrakaiby, J Pang - 2014 11th International Conference on …, 2014 - ieeexplore.ieee.org
Usage control extends access control by enabling the specification of requirements that should be satisfied before, while and after access. To ensure that the deployment of usage …
Usage control is concerned with what happens to data after access has been granted. In the literature, usage control models have been defined on the grounds of events that, somehow …
Usage control is a comprehensive access control model developed to cater the security needs of the wide range of applications. Formal specification of the core usage control …
A Pretschner, J Rüesch, C Schaefer… - … Reliability and Security, 2009 - ieeexplore.ieee.org
Usage control is a generalization of access control that also addresses how data is handled after it is released. Usage control requirements are specified in policies. We present tool …
R Neisse, J Doerr - … Annual Conference on Privacy, Security and …, 2013 - ieeexplore.ieee.org
In existing usage control policy frameworks, policies consisting of authorizations and obligations are specified at a low level of abstraction. As a consequence, these policy …
A Pretschner, M Hilty, D Basin, C Schaefer… - Proceedings of the 2008 …, 2008 - dl.acm.org
Mechanisms for usage control Page 1 Mechanisms for Usage Control A. Pretschner, M. Hilty, D. Basin Information Security, ETH Zurich, Switzerland {pretscha,hiltym,basin}@inf.ethz.ch C …