Application layer security for internet communications: A comprehensive review, challenges, and future trends

D Cevallos-Salas, J Estrada-Jiménez… - Computers and Electrical …, 2024 - Elsevier
The security of Internet communications has traditionally been delegated to controls at lower
layers of the Transmission Control Protocol/Internet Protocol (TCP/IP) architecture. However …

Usage control: A vision for next generation access control

R Sandhu, J Park - … Network Security: Second International Workshop on …, 2003 - Springer
The term usage control (UCON) is a generalization of access control to cover obligations,
conditions, continuity (ongoing controls) and mutability. Traditionally, access control has …

Secure information sharing enabled by trusted computing and PEI models

R Sandhu, K Ranganathan, X Zhang - … of the 2006 ACM Symposium on …, 2006 - dl.acm.org
The central goal of secure information sharing is to" share but protect" where the motivation
to" protect" is to safeguard the sensitive content from unauthorized disclosure (in contrast to …

[PDF][PDF] The research of access control based on UCON in the internet of things

Z Guoping, G Wentao - Journal of Software, 2011 - researchgate.net
In this paper, we introduce the internet of things and related architecture and protocols, and
the family of usage control (UCON) models, which integrate authorizations (A), obligations …

Fair use, DRM, and trusted computing

JS Erickson - Communications of the ACM, 2003 - dl.acm.org
Fair use, DRM, and trusted computing Page 1 34 April 2003/Vol. 46, No. 4 COMMUNICATIONS
OF THE ACM FAIR USE, DRM, AND TRUSTED COMPUTING How can DRM architectures …

Semantic access control for cloud computing based on e-Healthcare

L Sun, H Wang, J Yong, G Wu - Proceedings of the 2012 IEEE …, 2012 - ieeexplore.ieee.org
With the increased development of cloud computing, access control policies have become
an important issue in the security filed of cloud computing. Semantic web is the extension of …

Originator control in usage control

J Park, R Sandhu - … Third International Workshop on Policies for …, 2002 - ieeexplore.ieee.org
Originator control is an access control policy that requires recipients to gain originator's
approval for re-dissemination of disseminated digital object. Originator control policies are …

Digital rights management-an overview of current challenges and solutions

A Arnab, A Hutchison - 2004 - pubs.cs.uct.ac.za
Digital Rights Management (DRM) systems aim to create a secure framework to control
access and actions that can be performed by users (both human and machine). DRM …

Protecting privacy of sensitive data dissemination using active bundles

LB Othmane, L Lilien - … Congress on Privacy, Security, Trust and …, 2009 - ieeexplore.ieee.org
The solution for protecting data privacy proposed in this paper-called Active Bundles-
protects sensitive data from their disclosure to unauthorized parties and from unauthorized …

Modeling and implementation of digital rights

SO Hwang, KS Yoon, KP Jun, KH Lee - Journal of Systems and Software, 2004 - Elsevier
The widespread use of the Internet raises issues regarding intellectual property. After
content is downloaded, no further protection is provided on that content. DRM (Digital Rights …