An Overview of Distributed Usage Control – Extended
نویسنده
چکیده
Usage control generalizes access control to what happens to data in the future (“delete after thirty days,” “do not copy,” “notify owner upon access.”) Distributed usage control is about defining and enforcing usage control requirements on data after giving it away. It is relevant in the areas of data protection, the management of intellectual property, the management of secrets, and compliance with regulations. In this extended abstract, we provide an overview of the field. We introduce fundamental concepts, requirements, policy specifications, policy analyses, dissemination models, the enforcement of usage control requirements at different levels of abstraction, and the challenges ahead.
منابع مشابه
Neural Network Based Protection of Software Defined Network Controller against Distributed Denial of Service Attacks
Software Defined Network (SDN) is a new architecture for network management and its main concept is centralizing network management in the network control level that has an overview of the network and determines the forwarding rules for switches and routers (the data level). Although this centralized control is the main advantage of SDN, it is also a single point of failure. If this main contro...
متن کاملAn Overview of Group Key Management Issues in IEEE 802.16e Networks
The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...
متن کاملCodifying Distributed Cognition: A Case Study of Emergency Medical Dispatch
..............................................................................................................................................3 TABLE OF CONTENTS..........................................................................................................................4 TABLE OF TABLES....................................................................................................
متن کاملFORTES: Forensic Information Flow Analysis of Business Processes
From 06.04. to 09.04.2010, the Dagstuhl Seminar 10141 Distributed Usage Control was held in Schloss Dagstuhl Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put together in this...
متن کاملAn Overview on Microgrid Concept with Special Focus on Islanding Protection Issues
Subscriber service is not feasible in the construction of large-scale traditional networks with the aim of providing more services. The high distance between production and consumption requires the definition of a transmission network as a challenging intermediary. The cost of transmission network and the risk associated with it cannot be ignored at all. The idea of a microgrid, which began wit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009