메뉴 건너뛰기




Volumn 6, Issue 4, 2008, Pages 44-53

Usage control enforcement present and future

Author keywords

[No Author keywords available]

Indexed keywords

CONTROL MECHANISMS; OPERATING SYSTEMS; RUN-TIME SYSTEMS; SIGNALING MECHANISMS; STATE OF THE ARTS; USAGE CONTROL;

EID: 49249092646     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2008.101     Document Type: Article
Times cited : (59)

References (18)
  • 2
    • 33748543201 scopus 로고    scopus 로고
    • Distributed Usage Control
    • A. Pretschner, M. Hilty, and D. Basin, "Distributed Usage Control," Comm. ACM, vol. 49, no. 9, 2006, pp. 39-44.
    • (2006) Comm. ACM , vol.49 , Issue.9 , pp. 39-44
    • Pretschner, A.1    Hilty, M.2    Basin, D.3
  • 3
    • 49249106335 scopus 로고    scopus 로고
    • A System Model and an Obligation Language for Distributed Usage Control
    • I-ST-20, DoCoMo Euro-Labs, Dec
    • M. Hilty et al., A System Model and an Obligation Language for Distributed Usage Control, tech. report I-ST-20, DoCoMo Euro-Labs, Dec. 2006; www.docomoeurolabs.de/pdf/ A_System_Model_and_an_Obligation_Language_for_Distributed_Usage_Control.pdf.
    • (2006) tech. report
    • Hilty, M.1
  • 4
    • 0345829056 scopus 로고    scopus 로고
    • Provisions and Obligations in Policy Rule Management
    • C. Bettini et al., "Provisions and Obligations in Policy Rule Management," J. Network and System Management, vol. 11, no. 3, 2003, pp. 351-372.
    • (2003) J. Network and System Management , vol.11 , Issue.3 , pp. 351-372
    • Bettini, C.1
  • 5
    • 0033489645 scopus 로고    scopus 로고
    • Optimistic Security: A New Access Control Paradigm
    • ACM
    • D. Povey, "Optimistic Security: A New Access Control Paradigm," Proc. Workshop on New Security Paradigms, ACM, 1999, pp. 40-45.
    • (1999) Proc. Workshop on New Security Paradigms , pp. 40-45
    • Povey, D.1
  • 6
    • 40249090155 scopus 로고    scopus 로고
    • Usage Control Requirements in Mobile and Ubiquitous Computing Applications
    • IEEE CS Press
    • M. Hilty et al., "Usage Control Requirements in Mobile and Ubiquitous Computing Applications," Proc. Int'l. Conf. Systems and Networks Communications, IEEE CS Press, 2006.
    • (2006) Proc. Int'l. Conf. Systems and Networks Communications
    • Hilty, M.1
  • 8
    • 35248890958 scopus 로고    scopus 로고
    • Requirements for a Rights Data Dictionary and Rights Expression Language
    • Reuters, 2001;
    • D. Parrott, Requirements for a Rights Data Dictionary and Rights Expression Language, tech. report, Reuters, 2001; xml.coverpages.org/ Reuters-mpeg-response-v10-public.pdf.
    • tech. report
    • Parrott, D.1
  • 9
    • 0003187764 scopus 로고
    • Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 On The Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data
    • Nov
    • European Union, "Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 On The Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data," Official Journal L 281, Nov. 1995, pp. 31-50; http://eur-lex.europa.eu/ LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:EN:NOT.
    • (1995) Official Journal L , vol.281 , pp. 31-50
  • 10
    • 49249113313 scopus 로고    scopus 로고
    • Privacy and Identity Management for Europe (Prime) Project, June
    • Privacy and Identity Management for Europe (Prime) Project, "Requirements v. 1," June 2005; www.prime-project.eu/prime_products/ reports/reqs/.
    • (2005) Requirements , vol.1
  • 11
    • 38049040380 scopus 로고    scopus 로고
    • A Policy Language for Distributed Usage Control
    • Springer-Verlag
    • M. Hilty et al., "A Policy Language for Distributed Usage Control," Proc. European Symp. Research in Computer Security, Springer-Verlag, 2007, pp. 531-546.
    • (2007) Proc. European Symp. Research in Computer Security , pp. 531-546
    • Hilty, M.1
  • 13
    • 37249019315 scopus 로고    scopus 로고
    • Enforcement for Usage Control - An Overview of Control Mechanisms
    • I-ST-18, DoCoMo Euro-Labs, July
    • M. Hilty et al., Enforcement for Usage Control - An Overview of Control Mechanisms, tech. report I-ST-18, DoCoMo Euro-Labs, July 2006; www.docomoeurolabs.de/pdf/ Enforcement_for_Usage_Control_an_Overview_of_Control_Mechanisms.pdf.
    • (2006) tech. report
    • Hilty, M.1
  • 14
    • 49249103584 scopus 로고    scopus 로고
    • Digital Content Protection, High-bandwidth Digital Content Protection System - v. 1.1, June 2003; www.digital-cp.com/files/static_page_files/ 8006F925-129D-4C12-C87899B5A76EF5C3/HDCP_Specification%20Rev1_3.pdf.
    • Digital Content Protection, High-bandwidth Digital Content Protection System - v. 1.1, June 2003; www.digital-cp.com/files/static_page_files/ 8006F925-129D-4C12-C87899B5A76EF5C3/HDCP_Specification%20Rev1_3.pdf.
  • 15
    • 33747846186 scopus 로고    scopus 로고
    • Client-Side Access Control Enforcement Using Trusted Computing and PEI Models
    • R. Sandhu et al., "Client-Side Access Control Enforcement Using Trusted Computing and PEI Models," J. High Speed Networks, vol. 15, no. 3, 2006, pp. 229-245.
    • (2006) J. High Speed Networks , vol.15 , Issue.3 , pp. 229-245
    • Sandhu, R.1
  • 16
    • 37149049972 scopus 로고    scopus 로고
    • Securing the Distribution and Storage of Secrets with Trusted Platform Modules
    • Proc. IEEE Workshop in Information Security Theory and Practices, Springer-Verlag
    • P. Sevinç, M. Strasser, and D. Basin, "Securing the Distribution and Storage of Secrets with Trusted Platform Modules," Proc. IEEE Workshop in Information Security Theory and Practices, LNCS 4462, Springer-Verlag, 2007, pp. 53-66.
    • (2007) LNCS , vol.4462 , pp. 53-66
    • Sevinç, P.1    Strasser, M.2    Basin, D.3
  • 17
    • 49249090339 scopus 로고    scopus 로고
    • Marlin Developer Community, Marlin Architecture Overview, 2006; www.marlin-community.com/images/wp/MarlinArchitectureOverview.pdf.
    • Marlin Developer Community, "Marlin Architecture Overview," 2006; www.marlin-community.com/images/wp/MarlinArchitectureOverview.pdf.
  • 18
    • 49249094930 scopus 로고    scopus 로고
    • Marlin Developer Community, The Role of Octopus in Marlin, 2006; www.marlin-community.com/images/wp/RoleofOctopusinMarlin.pdf.
    • Marlin Developer Community, "The Role of Octopus in Marlin," 2006; www.marlin-community.com/images/wp/RoleofOctopusinMarlin.pdf.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.