Enforcement for Usage Control - An Overview of Control Mechanisms
نویسندگان
چکیده
Executive Summary This document describes the results of the first two work packages of the research project " Enforcement for Usage Control " , carried out jointly by DoCoMo Euro-Labs and the Information Security group at ETH Zurich. The goal of the project is the development of a server-side architecture that enables the enforcement of usage control requirements at the data consumer's side. Data consumers can be both mobile phones and content providers. The goal of the first two work packages is to survey existing usage control mechanisms in order to identify which requirements are not yet supported, to create a systematic approach for classifying control mechanisms and describing their capabilities, and to define important areas of future work. The present report provides a taxonomy of usage control mechanisms, a survey of about twenty-five current Digital Rights Management (DRM) mechanisms and architectures, a comparison of these mechanisms on the grounds of the taxonomy, a discussion of the potential impact of heterogeneous client-side enforcement mechanisms on the server-side architecture, and a sketch of potential future work. The results can be summarized as follows. • The classification criteria for control mechanisms presented in this report can be used for systematically describing mechanisms and their capabilities. This is important for selecting the appropriate mechanism for a given use case. • There is a wide range of control mechanisms. However, many of them are very similar both in terms of the targeted applications and in terms of the usage requirements they can enforce. • There is a trend towards interoperability of DRM technologies and cross-industry standards. The industry seems to cater for the consumer's need to use content on any of their devices. The catalog of classification criteria can help determining if one mechanism can be safely replaced by another one that is available on a particular platform. • The weak links in encryption-based DRM mechanisms are key protection and protection of content after decryption. These problems can potentially be solved by means of hardware, e.g., trusted computing technology. • Client-side DRM mechanisms exist predominantly in the context of DRM for the protection of intellectual property. The areas of privacy and compliance are addressed only rudimentarily. • Observability and monitoring seem to be predominantly applicable when exchanging data between enterprises, e.g., telecommunication infrastructure providers and service/content providers. They have the potential of supporting usage requirements that are not enforced by control mechanisms. Observation mechanisms …
منابع مشابه
An Overview of Distributed Usage Control – Extended
Usage control generalizes access control to what happens to data in the future (“delete after thirty days,” “do not copy,” “notify owner upon access.”) Distributed usage control is about defining and enforcing usage control requirements on data after giving it away. It is relevant in the areas of data protection, the management of intellectual property, the management of secrets, and compliance...
متن کاملUsage Control Policy Enforcement in OpenOffice.org and Information Flow
Usage control is a generalisation of access control addressing how data is to be handled after it has been released. To control the data handling enforcement mechanisms have to be in place where the data is being used. These enforcement mechanisms can be implemented on different layers of the system. One way to do the enforcement is on the application layer. This paper describes how usage contr...
متن کاملUsage Control Enforcement - A Survey
Sharing information allows businesses to take advantage of hidden knowledge, improve work processes and cooperation both within and across organisations. Thus there is a need for improved information protection capable of restricting how information is used, as opposed to only accessed. Usage Control has been proposed to achieve this by combining and extending traditional access control, Digita...
متن کاملData protection in heterogeneous distributed systems: A smart meter example
Usage control is concerned with how data is used after access has been granted. Enforcement mechanisms have been implemented for distributed systems like web based social networks (WBSN) at various levels of abstraction. We extend data usage control to heterogeneous distributed systems by implementing a policy enforcement mechanism for a smart meter connected to a WBSN. The idea is to provide u...
متن کاملNewest Targets for Anticonvulsant Agents: An Overview
Epilepsy is a neurological condition characterized by recurrent seizures influencing about 1% of the worldwide population. Despite much progress in understanding the pathogenesis of epilepsy, the molecular basis of human epilepsy still remains unclear. Common approaches for pharmacotherapy of epilepsy are still directed towards controlling the symptoms and suppression of seizures. Clinical use ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006