Usage Control: A Vision for Next Generation Access Control

نویسندگان

  • Ravi S. Sandhu
  • Jaehong Park
چکیده

Protection Objectives Sensitive information protection IPR protection Privacy protection Protection Architectures Server-side reference monitor Client-side reference monitor SRM & CRM Server-side Reference Monitor (SRM) Client-side Reference Monitor (CRM) Traditional Access Control Trust Management Usage Control Sensitive Information Protection Intellectual Property Rights Protection Privacy Protection

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Logical Model and Specification of Usage Control

The recent usage control model (UCON) is a foundation for next generation access control models with distinguishing properties of decision continuity and attribute mutability. A usage control decision is determined by combining authorizations, obligations, and conditions, presented as UCONABC core models by Park and Sandhu. Based on these core aspects, we develop a firstorder logic specificatio...

متن کامل

Purpose Based Access Control for Privacy Protection in E-Healthcare Services

Information privacy is a major concern in many areas and none more so than in healthcare. E-healthcare is the use of web-based systems to share and deliver information across the internet. The design of proper models for authorization and access control for e-Health system services is necessary in a large health service. Usage control has been considered as the next generation access control mo...

متن کامل

Usage Control Model and Architecture for Data Confidentiality in Database Service Provider

Database Service Provider (DSP) is a provider in the Internet that provides service in maintaining data so users can access their data anytime and anywhere from the Internet. DSP model introduces several challenges. An important issue is data confidentiality. In this paper we propose a Usage Control (UCON) model and architecture that can be enforced to support data confidentiality in DSP model....

متن کامل

XML Schema in XML Documents with Usage Control

With an increasing amount of semi-structured data, XML has become significant to humans and programs. XML promoted by the World Wide Web Consortium (W3C) is rapidly emerging as a new standard language for semi-structured data representation and exchange on the Internet. XML documents usually contain private information that cannot be shared by all user communities. So securing XML data is becom...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003