Nothing Special   »   [go: up one dir, main page]

×
Please click here if you are not redirected within a few seconds.
In this paper we identify the general requirements of a trusted usage control enforcement in heterogeneous computing environments, and then propose a general ...
Security Enforcement Model for Distributed Usage Control. Xinwen Zhang and Jean-Pierre Seifert. Samsung Information Systems America. San Jose, California, USA.
In this paper we identify the general requirements of a trusted usage control enforcement in heterogeneous computing environments.
People also ask
In this paper, we propose DUCE, an enforcement model for distributed usage control for data sharing in ... management and secure usage control of iot big ...
We introduce fundamental concepts, re- quirements, policy specifications, policy analyses, dissemination models, the enforcement of usage control requirements ...
Distributed usage control is concerned with how data may or may not be used in distributed system environments after initial access has been granted.
Abstract. We present the Obligation Specification Language (OSL), a policy language for distributed usage control. OSL supports the formal-.
Oct 22, 2024 · To address security aspects of the IoT systems we propose in this paper a Model-based Security Toolkit named SecKit. SecKit supports integrated ...
ACM Conference on Computer and Communications Security, 2008. Usage control is a generalization of access control that also addresses how data is used after ...
In the DUKE project, we address the problem how the usage of data can be controlled once the data have been given away. Published in: Eighth IEEE International ...