An Overview of Distributed Usage Control – Extended

نویسنده

  • ALEXANDER PRETSCHNER
چکیده

Usage control generalizes access control to what happens to data in the future (“delete after thirty days,” “do not copy,” “notify owner upon access.”) Distributed usage control is about defining and enforcing usage control requirements on data after giving it away. It is relevant in the areas of data protection, the management of intellectual property, the management of secrets, and compliance with regulations. In this extended abstract, we provide an overview of the field. We introduce fundamental concepts, requirements, policy specifications, policy analyses, dissemination models, the enforcement of usage control requirements at different levels of abstraction, and the challenges ahead.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Neural Network Based Protection of Software Defined Network Controller against Distributed Denial of Service Attacks

Software Defined Network (SDN) is a new architecture for network management and its main concept is centralizing network management in the network control level that has an overview of the network and determines the forwarding rules for switches and routers (the data level). Although this centralized control is the main advantage of SDN, it is also a single point of failure. If this main contro...

متن کامل

An Overview of Group Key Management Issues in IEEE 802.16e Networks

The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...

متن کامل

Codifying Distributed Cognition: A Case Study of Emergency Medical Dispatch

..............................................................................................................................................3 TABLE OF CONTENTS..........................................................................................................................4 TABLE OF TABLES....................................................................................................

متن کامل

FORTES: Forensic Information Flow Analysis of Business Processes

From 06.04. to 09.04.2010, the Dagstuhl Seminar 10141 Distributed Usage Control was held in Schloss Dagstuhl Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put together in this...

متن کامل

An Overview on Microgrid Concept with Special Focus on Islanding Protection Issues

Subscriber service is not feasible in the construction of large-scale traditional networks with the aim of providing more services. The high distance between production and consumption requires the definition of a transmission network as a challenging intermediary. The cost of transmission network and the risk associated with it cannot be ignored at all. The idea of a microgrid, which began wit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009