Enforcement for Usage Control - An Overview of Control Mechanisms

نویسندگان

  • Alexander Pretschner
  • Christian Schaefer
  • Thomas Walter
چکیده

Executive Summary This document describes the results of the first two work packages of the research project " Enforcement for Usage Control " , carried out jointly by DoCoMo Euro-Labs and the Information Security group at ETH Zurich. The goal of the project is the development of a server-side architecture that enables the enforcement of usage control requirements at the data consumer's side. Data consumers can be both mobile phones and content providers. The goal of the first two work packages is to survey existing usage control mechanisms in order to identify which requirements are not yet supported, to create a systematic approach for classifying control mechanisms and describing their capabilities, and to define important areas of future work. The present report provides a taxonomy of usage control mechanisms, a survey of about twenty-five current Digital Rights Management (DRM) mechanisms and architectures, a comparison of these mechanisms on the grounds of the taxonomy, a discussion of the potential impact of heterogeneous client-side enforcement mechanisms on the server-side architecture, and a sketch of potential future work. The results can be summarized as follows. • The classification criteria for control mechanisms presented in this report can be used for systematically describing mechanisms and their capabilities. This is important for selecting the appropriate mechanism for a given use case. • There is a wide range of control mechanisms. However, many of them are very similar both in terms of the targeted applications and in terms of the usage requirements they can enforce. • There is a trend towards interoperability of DRM technologies and cross-industry standards. The industry seems to cater for the consumer's need to use content on any of their devices. The catalog of classification criteria can help determining if one mechanism can be safely replaced by another one that is available on a particular platform. • The weak links in encryption-based DRM mechanisms are key protection and protection of content after decryption. These problems can potentially be solved by means of hardware, e.g., trusted computing technology. • Client-side DRM mechanisms exist predominantly in the context of DRM for the protection of intellectual property. The areas of privacy and compliance are addressed only rudimentarily. • Observability and monitoring seem to be predominantly applicable when exchanging data between enterprises, e.g., telecommunication infrastructure providers and service/content providers. They have the potential of supporting usage requirements that are not enforced by control mechanisms. Observation mechanisms …

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Overview of Distributed Usage Control – Extended

Usage control generalizes access control to what happens to data in the future (“delete after thirty days,” “do not copy,” “notify owner upon access.”) Distributed usage control is about defining and enforcing usage control requirements on data after giving it away. It is relevant in the areas of data protection, the management of intellectual property, the management of secrets, and compliance...

متن کامل

Usage Control Policy Enforcement in OpenOffice.org and Information Flow

Usage control is a generalisation of access control addressing how data is to be handled after it has been released. To control the data handling enforcement mechanisms have to be in place where the data is being used. These enforcement mechanisms can be implemented on different layers of the system. One way to do the enforcement is on the application layer. This paper describes how usage contr...

متن کامل

Usage Control Enforcement - A Survey

Sharing information allows businesses to take advantage of hidden knowledge, improve work processes and cooperation both within and across organisations. Thus there is a need for improved information protection capable of restricting how information is used, as opposed to only accessed. Usage Control has been proposed to achieve this by combining and extending traditional access control, Digita...

متن کامل

Data protection in heterogeneous distributed systems: A smart meter example

Usage control is concerned with how data is used after access has been granted. Enforcement mechanisms have been implemented for distributed systems like web based social networks (WBSN) at various levels of abstraction. We extend data usage control to heterogeneous distributed systems by implementing a policy enforcement mechanism for a smart meter connected to a WBSN. The idea is to provide u...

متن کامل

Newest Targets for Anticonvulsant Agents: An Overview

Epilepsy is a neurological condition characterized by recurrent seizures influencing about 1% of the worldwide population. Despite much progress in understanding the pathogenesis of epilepsy, the molecular basis of human epilepsy still remains unclear. Common approaches for pharmacotherapy of epilepsy are still directed towards controlling the symptoms and suppression of seizures. Clinical use ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006