R Sandhu, J Park - … Network Security: Second International Workshop on …, 2003 - Springer
The term usage control (UCON) is a generalization of access control to cover obligations, conditions, continuity (ongoing controls) and mutability. Traditionally, access control has …
R Sandhu, K Ranganathan, X Zhang - … of the 2006 ACM Symposium on …, 2006 - dl.acm.org
The central goal of secure information sharing is to" share but protect" where the motivation to" protect" is to safeguard the sensitive content from unauthorized disclosure (in contrast to …
Z Guoping, G Wentao - Journal of Software, 2011 - researchgate.net
In this paper, we introduce the internet of things and related architecture and protocols, and the family of usage control (UCON) models, which integrate authorizations (A), obligations …
JS Erickson - Communications of the ACM, 2003 - dl.acm.org
Fair use, DRM, and trusted computing Page 1 34 April 2003/Vol. 46, No. 4 COMMUNICATIONS OF THE ACM FAIR USE, DRM, AND TRUSTED COMPUTING How can DRM architectures …
L Sun, H Wang, J Yong, G Wu - Proceedings of the 2012 IEEE …, 2012 - ieeexplore.ieee.org
With the increased development of cloud computing, access control policies have become an important issue in the security filed of cloud computing. Semantic web is the extension of …
J Park, R Sandhu - … Third International Workshop on Policies for …, 2002 - ieeexplore.ieee.org
Originator control is an access control policy that requires recipients to gain originator's approval for re-dissemination of disseminated digital object. Originator control policies are …
Digital Rights Management (DRM) systems aim to create a secure framework to control access and actions that can be performed by users (both human and machine). DRM …
LB Othmane, L Lilien - … Congress on Privacy, Security, Trust and …, 2009 - ieeexplore.ieee.org
The solution for protecting data privacy proposed in this paper-called Active Bundles- protects sensitive data from their disclosure to unauthorized parties and from unauthorized …
SO Hwang, KS Yoon, KP Jun, KH Lee - Journal of Systems and Software, 2004 - Elsevier
The widespread use of the Internet raises issues regarding intellectual property. After content is downloaded, no further protection is provided on that content. DRM (Digital Rights …