Loading [MathJax]/extensions/MathZoom.js
Usage Control Enforcement: Present and Future | IEEE Journals & Magazine | IEEE Xplore

Usage Control Enforcement: Present and Future


Abstract:

Both personal data and intellectual property must be protected for various reasons. The authors explore the state of the art in usage control, which is about controlling ...Show More

Abstract:

Both personal data and intellectual property must be protected for various reasons. The authors explore the state of the art in usage control, which is about controlling the use of such data after it has been given away, and identify room for improvement.
Published in: IEEE Security & Privacy ( Volume: 6, Issue: 4, July-Aug. 2008)
Page(s): 44 - 53
Date of Publication: 31 August 2008

ISSN Information:

References is not available for this document.

Background

We call data that's subject to usage control ucdata. The fundamental problem of distributed usage control is that data providers want to impose control on how data consumers’ processing devices or information systems handle data. Unfortunately for the data providers, however, these machines are usually outside their scope of control or even visibility.

Select All
1.
J. Park and R. Sandhu, "The UCON ABC Usage Control Model", ACM Trans. Information and Systems Security, vol. 7, no. 1, pp. 128-174, 2004.
2.
A. Pretschner, M. Hilty and D. Basin, "Distributed Usage Control", Comm. ACM, vol. 49, no. 9, pp. 39-44, 2006.
3.
M. Hilty et al., A System Model and an Obligation Language for Distributed Usage Control tech. report I-ST-20 Do-CoMo Euro-Labs, Dec. 2006.
4.
C. Bettini et al., "Provisions and Obligations in Policy Rule Management", J. Network and System Management, vol. 11, no. 3, pp. 351-372, 2003.
5.
D. Povey, "Optimistic Security: A New Access Control Paradigm", Proc. Workshop on New Security Paradigms ACM, pp. 40-45, 1999.
6.
M. Hilty et al., "Usage Control Requirements in Mobile and Ubiquitous Computing Applications", Proc. Int'l. Conf. Systems and Networks Communications IEEE CS Press, 2006.
7.
S. Guth and R. Iannella, Open Digital Rights Language (ODRL) Version 2 Requirements, Feb. 2005.
8.
D. Parrott, Requirements for a Rights Data Dictionary and Rights Expression Language tech. report Reuters, 2001.
9.
"Directive 95/46/EC of the European Parliament and of the Council of 24 October1995 On The Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data", European Union, pp. 31-50, Nov. 1995.
10.
"Requirements v. 1", Privacy and Identity Management for Europe (Prime) Project, June 2005.
11.
M. Hilty et al., "A Policy Language for Distributed Usage Control", Proc. European Symp. Research in Computer Security Springer-Verlag, pp. 531-546, 2007.
12.
X. Wang et al., "XrML-eXtensible Rights Markup Language", Proc. ACM Workshop on XML Security (XMLSEC 02) ACM Press, pp. 71-79, 2002.
13.
M. Hilty et al., Enforcement for Usage Control-An Overview of Control Mechanisms tech. report I-ST-18 DoCoMo Euro-Labs, July 2006.
14.
Digital Content Protection High-bandwidth Digital Content Protection System – v. 1.1, June 2003.
15.
R. Sandhu et al., "Client-Side Access Control Enforcement Using Trusted Computing and PEI Models", J. High Speed Networks, vol. 15, no. 3, pp. 229-245, 2006.
16.
P. Sevinc, M. Strasser and D. Basin, "Securing the Distribution and Storage of Secrets with Trusted Platform Modules", Proc. IEEE Workshop in Information Security Theory and Practices LNCS 4462 Springer-Verlag, pp. 53-66, 2007.
17.
"Marlin Architecture Overview", Marlin Developer Community, 2006.
18.
"The Role of Octopus in Marlin", Marlin Developer Community, 2006.
Contact IEEE to Subscribe

References

References is not available for this document.