Usage control in computer security: A survey

A Lazouski, F Martinelli, P Mori - Computer Science Review, 2010 - Elsevier
Protecting access to digital resources is one of the fundamental problems recognized in
computer security. As yet it remains a challenging problem to work out, starting from the …

A systematic literature review for authorization and access control: definitions, strategies and models

AKYS Mohamed, D Auer, D Hofer… - International journal of web …, 2022 - emerald.com
Purpose Authorization and access control have been a topic of research for several
decades. However, existing definitions are inconsistent and even contradicting each other …

Privacy-aware role-based access control

Q Ni, E Bertino, J Lobo, C Brodie, CM Karat… - ACM Transactions on …, 2010 - dl.acm.org
In this article, we introduce a comprehensive framework supporting a privacy-aware access
control mechanism, that is, a mechanism tailored to enforce access control to data …

Secure information sharing enabled by trusted computing and PEI models

R Sandhu, K Ranganathan, X Zhang - … of the 2006 ACM Symposium on …, 2006 - dl.acm.org
The central goal of secure information sharing is to" share but protect" where the motivation
to" protect" is to safeguard the sensitive content from unauthorized disclosure (in contrast to …

[PDF][PDF] The research of access control based on UCON in the internet of things

Z Guoping, G Wentao - Journal of Software, 2011 - researchgate.net
In this paper, we introduce the internet of things and related architecture and protocols, and
the family of usage control (UCON) models, which integrate authorizations (A), obligations …

Audit-based compliance control

JG Cederquist, R Corin, MAC Dekker, S Etalle… - International Journal of …, 2007 - Springer
In this paper we introduce a new framework for controlling compliance to discretionary
access control policies [Cederquist et al. in Proceedings of the International Workshop on …

An access control language for a general provenance model

Q Ni, S Xu, E Bertino, R Sandhu, W Han - Workshop on Secure Data …, 2009 - Springer
Provenance access control has been recognized as one of the most important components
in an enterprise-level provenance system. However, it has only received little attention in the …

A posteriori compliance control

S Etalle, WH Winsborough - Proceedings of the 12th ACM symposium …, 2007 - dl.acm.org
While preventative policy enforcement mechanisms can provide theoretical guarantees that
policy is correctly enforced, they have limitations in practice. They are inflexible when …

Data usage control for distributed systems

F Kelbert, A Pretschner - ACM Transactions on Privacy and Security …, 2018 - dl.acm.org
Data usage control enables data owners to enforce policies over how their data may be
used after they have been released and accessed. We address distributed aspects of this …

Group-centric secure information-sharing models for isolated groups

R Krishnan, J Niu, R Sandhu… - ACM Transactions on …, 2011 - dl.acm.org
Group-Centric Secure Information Sharing (g-SIS) envisions bringing users and objects
together in a group to facilitate agile sharing of information brought in from external sources …