Usage Control: a Unified Framework for next Generation Access Control

نویسندگان

  • Jaehong Park
  • Ravi Sandhu
چکیده

xi Chapter

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The ABC Core Model for Usage Control: Integrating Authorizations, oBligations, and Conditions

In this paper, we introduce the family of ABC (Authorizations, oBligations, and Conditions) models for usage control (UCON). We call these core models because they address the essence of usage control, leaving administration, delegation and other important but second-order issues for later work. The term usage control is a generalization of access control to cover obligations, conditions, conti...

متن کامل

Usage Control Model and Architecture for Data Confidentiality in Database Service Provider

Database Service Provider (DSP) is a provider in the Internet that provides service in maintaining data so users can access their data anytime and anywhere from the Internet. DSP model introduces several challenges. An important issue is data confidentiality. In this paper we propose a Usage Control (UCON) model and architecture that can be enforced to support data confidentiality in DSP model....

متن کامل

Towards Compliance and Accountability: a Framework for Privacy Online

Over the last twenty years, there has been a tremendous growth in the amount of data collected about individuals. Most existing privacy enhancing technologies could not prevent privacy breach effectively, since the real threat is not the control of private data access but the control of usage. While "access control" is well understood, how to achieve "usage control" is still unclear. In the onl...

متن کامل

Usage Control: A Vision for Next Generation Access Control

Protection Objectives Sensitive information protection IPR protection Privacy protection Protection Architectures Server-side reference monitor Client-side reference monitor SRM & CRM Server-side Reference Monitor (SRM) Client-side Reference Monitor (CRM) Traditional Access Control Trust Management Usage Control Sensitive Information Protection Intellectual Property Rights Protection Privacy Pr...

متن کامل

Unifying Access and Resource Usage Control over Standard Client-Server Interactions

We propose a novel framework for integrated access and resource usage control over standard client server interactions. Historically, access control has been developed without considering resource usage. Resource control has thus developed as an ad hoc server-centric set of mechanisms (e.g., file system quota, network bandwidth quote, etc.). We believe that resource usage control is strongly re...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003