-
1
-
-
0242456750
-
Towards usage control models: Beyond traditional access control
-
ACM, New York, NY, USA
-
Park J., and Sandhu R. Towards usage control models: Beyond traditional access control. SACMAT'02: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies (2002), ACM, New York, NY, USA 57-64
-
(2002)
SACMAT'02: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies
, pp. 57-64
-
-
Park, J.1
Sandhu, R.2
-
2
-
-
33746075198
-
-
Ph.D. Thesis, George Mason University, Fairfax, VA, USA
-
J. Park, Usage control: A unified framework for next generation access control, Ph.D. Thesis, George Mason University, Fairfax, VA, USA, 2003.
-
(2003)
Usage control: A unified framework for next generation access control
-
-
Park, J.1
-
3
-
-
70449377867
-
-
Ph.D. Thesis, George Mason University, Fairfax, VA, USA
-
X. Zhang, Formal model and analysis of usage control, Ph.D. Thesis, George Mason University, Fairfax, VA, USA, 2006.
-
(2006)
Formal model and analysis of usage control
-
-
Zhang, X.1
-
5
-
-
34249811174
-
A survey of trust in computer science and the semantic web
-
Artz D., and Gil Y. A survey of trust in computer science and the semantic web. Web Semant. 5 2 (2007) 58-71
-
(2007)
Web Semant.
, vol.5
, Issue.2
, pp. 58-71
-
-
Artz, D.1
Gil, Y.2
-
6
-
-
77950858815
-
Security aspects of DRM systems
-
H.L. Jonker, S. Mauw, J.H.S. Verschuren, A.T.S.C. Schoonen, Security aspects of DRM systems, in: 25th Symposium on Information Theory in the Benelux, 2004, pp. 169-176.
-
(2004)
25th Symposium on Information Theory in the Benelux
, pp. 169-176
-
-
Jonker, H.L.1
Mauw, S.2
Verschuren, J.H.S.3
Schoonen, A.T.S.C.4
-
7
-
-
7444222166
-
Digital rights management for content distribution
-
Australian Computer Society, Inc., Darlinghurst, Australia, Australia
-
Liu Q., Safavi-Naini R., and Sheppard N.P. Digital rights management for content distribution. ACSW Frontiers'03: Proceedings of the Australasian Information Security Workshop (2003), Australian Computer Society, Inc., Darlinghurst, Australia, Australia 49-58
-
(2003)
ACSW Frontiers'03: Proceedings of the Australasian Information Security Workshop
, pp. 49-58
-
-
Liu, Q.1
Safavi-Naini, R.2
Sheppard, N.P.3
-
8
-
-
35248873795
-
Usage control: A vision for next generation access control
-
MMM-ACNS, Springer
-
Sandhu R.S., and Park J. Usage control: A vision for next generation access control. MMM-ACNS. Lecture Notes in Computer Science vol. 2776 (2003), Springer 17-31
-
(2003)
Lecture Notes in Computer Science
, vol.2776
, pp. 17-31
-
-
Sandhu, R.S.1
Park, J.2
-
9
-
-
34548052702
-
PEI models towards scalable, usable and high-assurance information sharing
-
ACM, New York, NY, USA
-
Krishnan R., Sandhu R., and Ranganathan K. PEI models towards scalable, usable and high-assurance information sharing. SACMAT'07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies (2007), ACM, New York, NY, USA 145-150
-
(2007)
SACMAT'07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies
, pp. 145-150
-
-
Krishnan, R.1
Sandhu, R.2
Ranganathan, K.3
-
10
-
-
34247346997
-
Secure information sharing enabled by trusted computing and PEI models
-
ACM, New York, NY, USA
-
Sandhu R., Ranganathan K., and Zhang X. Secure information sharing enabled by trusted computing and PEI models. ASIACCS'06: Proceedings of ACM Symposium on Information, Computer and Communications Security (2006), ACM, New York, NY, USA 2-12
-
(2006)
ASIACCS'06: Proceedings of ACM Symposium on Information, Computer and Communications Security
, pp. 2-12
-
-
Sandhu, R.1
Ranganathan, K.2
Zhang, X.3
-
13
-
-
57349085064
-
Model-based behavioral attestation
-
ACM, New York, NY, USA
-
Alam M., Zhang X., Nauman M., Ali T., and Seifert J.-P. Model-based behavioral attestation. SACMAT'08: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies (2008), ACM, New York, NY, USA 175-184
-
(2008)
SACMAT'08: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies
, pp. 175-184
-
-
Alam, M.1
Zhang, X.2
Nauman, M.3
Ali, T.4
Seifert, J.-P.5
-
15
-
-
0035790651
-
A model of OASIS role-based access control and its support for active security
-
ACM, New York, NY, USA
-
Yao W., Moody K., and Bacon J. A model of OASIS role-based access control and its support for active security. SACMAT'01: Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies (2001), ACM, New York, NY, USA 171-181
-
(2001)
SACMAT'01: Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies
, pp. 171-181
-
-
Yao, W.1
Moody, K.2
Bacon, J.3
-
16
-
-
33845230194
-
Survey on the technological aspects of digital rights management
-
Ku W., and Chi C.-H. Survey on the technological aspects of digital rights management. Information Security (2004) 391-403
-
(2004)
Information Security
, pp. 391-403
-
-
Ku, W.1
Chi, C.-H.2
-
17
-
-
84902461453
-
Attribute mutability in usage control
-
Kluwer
-
Park J., Zhang X., and Sandhu R.S. Attribute mutability in usage control. DBSec (2004), Kluwer 15-29
-
(2004)
DBSec
, pp. 15-29
-
-
Park, J.1
Zhang, X.2
Sandhu, R.S.3
-
18
-
-
38549141554
-
Secured web services based on extended usage control
-
PAKDD Workshops, Springer
-
Shin W., and Yoo S.B. Secured web services based on extended usage control. PAKDD Workshops. Lecture Notes in Computer Science vol. 4819 (2007), Springer 656-663
-
(2007)
Lecture Notes in Computer Science
, vol.4819
, pp. 656-663
-
-
Shin, W.1
Yoo, S.B.2
-
19
-
-
47849106850
-
Research on usage control model with delegation characteristics based on OM-AM methodology
-
Z. Zhang, L. Yang, Q. Pei, J. Ma, Research on usage control model with delegation characteristics based on OM-AM methodology, in: NPC'2007: Proceedings of Network and Parallel Computing Workshops, 2007, pp. 238-243.
-
(2007)
NPC'2007: Proceedings of Network and Parallel Computing Workshops
, pp. 238-243
-
-
Zhang, Z.1
Yang, L.2
Pei, Q.3
Ma, J.4
-
20
-
-
77950866990
-
A new modeling paradigm for dynamic authorization in multi-domain systems
-
Springer, Berlin, Heidelberg
-
Sastry M., Krishnan R., and Sandhu R. A new modeling paradigm for dynamic authorization in multi-domain systems. Communications in Computer and Information Science vol. 1 (2007), Springer, Berlin, Heidelberg 153-158
-
(2007)
Communications in Computer and Information Science
, vol.1
, pp. 153-158
-
-
Sastry, M.1
Krishnan, R.2
Sandhu, R.3
-
21
-
-
62449262599
-
Controllable delegation model based on usage and trustworthiness
-
IEEE Computer Society, Washington, DC, USA
-
Luo X., Yang Y., and Hu Z. Controllable delegation model based on usage and trustworthiness. KAM'08: Proceedings of the 2008 International Symposium on Knowledge Acquisition and Modeling (2008), IEEE Computer Society, Washington, DC, USA 745-749
-
(2008)
KAM'08: Proceedings of the 2008 International Symposium on Knowledge Acquisition and Modeling
, pp. 745-749
-
-
Luo, X.1
Yang, Y.2
Hu, Z.3
-
22
-
-
57349136722
-
A general obligation model and continuity: Enhanced policy enforcement engine for usage control
-
ACM, New York, NY, USA
-
Katt B., Zhang X., Breu R., Hafner M., and Seifert J.-P. A general obligation model and continuity: Enhanced policy enforcement engine for usage control. SACMAT'08: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies (2008), ACM, New York, NY, USA 123-132
-
(2008)
SACMAT'08: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies
, pp. 123-132
-
-
Katt, B.1
Zhang, X.2
Breu, R.3
Hafner, M.4
Seifert, J.-P.5
-
23
-
-
33646071594
-
On obligations
-
M. Hilty, D. Basin, A. Pretschner, On obligations, in: Proceedings of ESORICS 2005, 2005, pp. 98-117.
-
(2005)
Proceedings of ESORICS
, pp. 98-117
-
-
Hilty, M.1
Basin, D.2
Pretschner, A.3
-
26
-
-
84893077785
-
Obligation monitoring in policy management
-
IEEE Computer Society, Washington, DC, USA
-
Bettini C., Jajodia S., Wang X., and Wijesekera D. Obligation monitoring in policy management. POLICY'02: Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (2002), IEEE Computer Society, Washington, DC, USA
-
(2002)
POLICY'02: Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks
-
-
Bettini, C.1
Jajodia, S.2
Wang, X.3
Wijesekera, D.4
-
27
-
-
33744982882
-
Obligation policies: An enforcement platform
-
IEEE Computer Society, Washington, DC, USA
-
Gama P., and Ferreira P. Obligation policies: An enforcement platform. POLICY'05: Proceedings of the Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (2005), IEEE Computer Society, Washington, DC, USA 203-212
-
(2005)
POLICY'05: Proceedings of the Sixth IEEE International Workshop on Policies for Distributed Systems and Networks
, pp. 203-212
-
-
Gama, P.1
Ferreira, P.2
-
28
-
-
0022334918
-
Ensuring integrity by adding obligations to privileges
-
IEEE Computer Society Press, Los Alamitos, CA, USA
-
Minsky N.H., and Lockman A.D. Ensuring integrity by adding obligations to privileges. ICSE'85: Proceedings of the 8th International Conference on Software Engineering (1985), IEEE Computer Society Press, Los Alamitos, CA, USA 92-102
-
(1985)
ICSE'85: Proceedings of the 8th International Conference on Software Engineering
, pp. 92-102
-
-
Minsky, N.H.1
Lockman, A.D.2
-
29
-
-
35248863915
-
Obligations for role based access control
-
IEEE Computer Society, Washington, DC, USA
-
Zhao G., Chadwick D., and Otenko S. Obligations for role based access control. AINAW'07: Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops (2007), IEEE Computer Society, Washington, DC, USA 424-431
-
(2007)
AINAW'07: Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops
, pp. 424-431
-
-
Zhao, G.1
Chadwick, D.2
Otenko, S.3
-
30
-
-
33745450500
-
Formal model and policy specification of usage control
-
Zhang X., Parisi-Presicce F., Sandhu R., and Park J. Formal model and policy specification of usage control. ACM Trans. Inf. Syst. Secur. 8 4 (2005) 351-387
-
(2005)
ACM Trans. Inf. Syst. Secur.
, vol.8
, Issue.4
, pp. 351-387
-
-
Zhang, X.1
Parisi-Presicce, F.2
Sandhu, R.3
Park, J.4
-
31
-
-
0028424892
-
The temporal logic of actions
-
Lamport L. The temporal logic of actions. ACM Trans. Program. Lang. Syst. 16 3 (1994) 872-923
-
(1994)
ACM Trans. Program. Lang. Syst.
, vol.16
, Issue.3
, pp. 872-923
-
-
Lamport, L.1
-
32
-
-
4143074723
-
A logical specification for usage control
-
ACM, New York, NY, USA
-
Zhang X., Park J., Parisi-Presicce F., and Sandhu R. A logical specification for usage control. SACMAT'04: Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies (2004), ACM, New York, NY, USA 1-10
-
(2004)
SACMAT'04: Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies
, pp. 1-10
-
-
Zhang, X.1
Park, J.2
Parisi-Presicce, F.3
Sandhu, R.4
-
33
-
-
67649670564
-
Safety analysis of usage control authorization models
-
ACM, New York, NY, USA
-
Zhang X., Sandhu R., and Parisi-Presicce F. Safety analysis of usage control authorization models. ASIACCS'06: Proceedings of the ACM Symposium on Information, Computer and Communications Security (2006), ACM, New York, NY, USA 243-254
-
(2006)
ASIACCS'06: Proceedings of the ACM Symposium on Information, Computer and Communications Security
, pp. 243-254
-
-
Zhang, X.1
Sandhu, R.2
Parisi-Presicce, F.3
-
34
-
-
34548016799
-
A notes on the formalisation of UCON
-
ACM, New York, NY, USA
-
Janicke H., Cau A., and Zedan H. A notes on the formalisation of UCON. SACMAT'07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies (2007), ACM, New York, NY, USA 163-168
-
(2007)
SACMAT'07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies
, pp. 163-168
-
-
Janicke, H.1
Cau, A.2
Zedan, H.3
-
35
-
-
38049040380
-
A policy language for distributed usage control
-
M. Hilty, A. Pretschner, D.A. Basin, C. Schaefer, T. Walter, A policy language for distributed usage control, in: ESORICS'07 Proceedings, 2007, pp. 531-546.
-
(2007)
ESORICS'07 Proceedings
, pp. 531-546
-
-
Hilty, M.1
Pretschner, A.2
Basin, D.A.3
Schaefer, C.4
Walter, T.5
-
37
-
-
57849100172
-
Mechanisms for usage control
-
ACM, New York, NY, USA
-
Pretschner A., Hilty M., Basin D., Schaefer C., and Walter T. Mechanisms for usage control. ASIACCS'08: Proceedings of ACM symposium on Information, Computer and Communications Security (2008), ACM, New York, NY, USA 240-244
-
(2008)
ASIACCS'08: Proceedings of ACM symposium on Information, Computer and Communications Security
, pp. 240-244
-
-
Pretschner, A.1
Hilty, M.2
Basin, D.3
Schaefer, C.4
Walter, T.5
-
38
-
-
49049119105
-
Negotiation of usage control policies - Simply the best?
-
IEEE Computer Society, Washington, DC, USA
-
Pretschner A., and Walter T. Negotiation of usage control policies - Simply the best?. ARES'08: Proceedings of Third International Conference on Availability, Reliability and Security (2008), IEEE Computer Society, Washington, DC, USA 1135-1136
-
(2008)
ARES'08: Proceedings of Third International Conference on Availability, Reliability and Security
, pp. 1135-1136
-
-
Pretschner, A.1
Walter, T.2
-
39
-
-
70349250946
-
A technical architecture for enforcing usage control requirements in service-oriented architectures
-
ACM, New York, NY, USA
-
Berthold A., Alam M., Breu R., Hafner M., Pretschner A., Seifert J.-P., and Zhang X. A technical architecture for enforcing usage control requirements in service-oriented architectures. SWS'07: Proceedings of ACM Workshop on Secure Web Services (2007), ACM, New York, NY, USA 18-25
-
(2007)
SWS'07: Proceedings of ACM Workshop on Secure Web Services
, pp. 18-25
-
-
Berthold, A.1
Alam, M.2
Breu, R.3
Hafner, M.4
Pretschner, A.5
Seifert, J.-P.6
Zhang, X.7
-
40
-
-
37249079159
-
Usage control in service-oriented architectures
-
TrustBus. Lambrinoudakis C., Pernul G., and Tjoa A.M. (Eds), Springer
-
Pretschner A., Massacci F., and Hilty M. Usage control in service-oriented architectures. In: Lambrinoudakis C., Pernul G., and Tjoa A.M. (Eds). TrustBus. Lecture Notes in Computer Science vol. 4657 (2007), Springer 83-93
-
(2007)
Lecture Notes in Computer Science
, vol.4657
, pp. 83-93
-
-
Pretschner, A.1
Massacci, F.2
Hilty, M.3
-
41
-
-
40249090155
-
Usage control requirements in mobile and ubiquitous computing applications
-
IEEE Computer Society, Washington, DC, USA
-
Hilty M., Pretschner A., Schaefer C., and Walter T. Usage control requirements in mobile and ubiquitous computing applications. ICSNC'06: Proceedings of the International Conference on Systems and Networks Communication (2006), IEEE Computer Society, Washington, DC, USA
-
(2006)
ICSNC'06: Proceedings of the International Conference on Systems and Networks Communication
-
-
Hilty, M.1
Pretschner, A.2
Schaefer, C.3
Walter, T.4
-
42
-
-
33845335567
-
Improving grid services security with fine grain policies
-
OTM Workshops, Springer
-
Baiardi F., Martinelli F., Mori P., and Vaccarelli A. Improving grid services security with fine grain policies. OTM Workshops. Lecture Notes in Computer Science (2004), Springer 123-134
-
(2004)
Lecture Notes in Computer Science
, pp. 123-134
-
-
Baiardi, F.1
Martinelli, F.2
Mori, P.3
Vaccarelli, A.4
-
44
-
-
33845332032
-
Towards continuous usage control on grid computational services
-
IEEE Computer Society, Washington, DC, USA
-
Martinelli F., Mori P., and Vaccarelli A. Towards continuous usage control on grid computational services. ICAS-ICNS'05: Proceedings of the Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services (2005), IEEE Computer Society, Washington, DC, USA
-
(2005)
ICAS-ICNS'05: Proceedings of the Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services
-
-
Martinelli, F.1
Mori, P.2
Vaccarelli, A.3
-
45
-
-
77950863053
-
Usage control for trust and security in next generation grids
-
MIT Press
-
Massonet P., Arenas A., Martinelli F., Mori P., and Crispo B. Usage control for trust and security in next generation grids. At Your Service: Service Engineering in the Information Society Technologies Program (2008), MIT Press
-
(2008)
At Your Service: Service Engineering in the Information Society Technologies Program
-
-
Massonet, P.1
Arenas, A.2
Martinelli, F.3
Mori, P.4
Crispo, B.5
-
46
-
-
68449090010
-
Enhancing grid security by fine-grained behavioral control and negotiation-based authorization
-
Koshutanski H., Lazouski A., Martinelli F., and Mori P. Enhancing grid security by fine-grained behavioral control and negotiation-based authorization. Int. J. Inform. Secur. 8 4 (2009) 291-314
-
(2009)
Int. J. Inform. Secur.
, vol.8
, Issue.4
, pp. 291-314
-
-
Koshutanski, H.1
Lazouski, A.2
Martinelli, F.3
Mori, P.4
-
47
-
-
33746064509
-
Timed constraint programming: A declarative approach to usage control
-
ACM, New York, NY, USA
-
Jagadeesan R., Marrero W., Pitcher C., and Saraswat V. Timed constraint programming: A declarative approach to usage control. PPDP'05: Proceedings of the 7th ACM SIGPLAN International Conference on Principles and Practice of Declarative Programming (2005), ACM, New York, NY, USA 164-175
-
(2005)
PPDP'05: Proceedings of the 7th ACM SIGPLAN International Conference on Principles and Practice of Declarative Programming
, pp. 164-175
-
-
Jagadeesan, R.1
Marrero, W.2
Pitcher, C.3
Saraswat, V.4
-
48
-
-
33845517298
-
Security analysis in role-based access control
-
Li N., and Tripunitara M.V. Security analysis in role-based access control. ACM Trans. Inf. Syst. Secur. 9 4 (2006) 391-420
-
(2006)
ACM Trans. Inf. Syst. Secur.
, vol.9
, Issue.4
, pp. 391-420
-
-
Li, N.1
Tripunitara, M.V.2
-
49
-
-
0038825043
-
Beyond proof-of-compliance: Safety and availability analysis in trust management
-
IEEE Computer Society Press
-
Li N., and Mitchell J.C. Beyond proof-of-compliance: Safety and availability analysis in trust management. Proceedings of IEEE Symposium on Security and Privacy (2003), IEEE Computer Society Press 123-139
-
(2003)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 123-139
-
-
Li, N.1
Mitchell, J.C.2
-
51
-
-
84964853055
-
Access control: Policies, models, and mechanisms
-
Springer-Verlag, London, UK
-
Samarati P., and di Vimercati S.D.C. Access control: Policies, models, and mechanisms. FOSAD'00: International School on Foundations of Security Analysis and Design (2001), Springer-Verlag, London, UK 137-196
-
(2001)
FOSAD'00: International School on Foundations of Security Analysis and Design
, pp. 137-196
-
-
Samarati, P.1
di Vimercati, S.D.C.2
-
52
-
-
84876720273
-
-
ITU-T Recommendation X.812, security frameworks for open systems: Access control framework, in: ISO/IEC 10181-3, Int'l Telecomm. Union, Geneva, 1996.
-
ITU-T Recommendation X.812, security frameworks for open systems: Access control framework, in: ISO/IEC 10181-3, Int'l Telecomm. Union, Geneva, 1996.
-
-
-
-
53
-
-
33748031099
-
A usage-based authorization framework for collaborative computing systems
-
ACM, New York, NY, USA
-
Zhang X., Nakae M., Covington M.J., and Sandhu R. A usage-based authorization framework for collaborative computing systems. SACMAT'06: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies (2006), ACM, New York, NY, USA 180-189
-
(2006)
SACMAT'06: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies
, pp. 180-189
-
-
Zhang, X.1
Nakae, M.2
Covington, M.J.3
Sandhu, R.4
-
54
-
-
85010312197
-
Usage control model and architecture for data confidentiality in a database service provider
-
Amril S., Toshihiro T., and Kouichi S. Usage control model and architecture for data confidentiality in a database service provider. Trans. Inform. Process. Soc. Japan 47 2 (2006) 621-626
-
(2006)
Trans. Inform. Process. Soc. Japan
, vol.47
, Issue.2
, pp. 621-626
-
-
Amril, S.1
Toshihiro, T.2
Kouichi, S.3
-
56
-
-
84893070616
-
Originator control in usage control
-
IEEE Computer Society, Washington, DC, USA
-
Park J., and Sandhu R. Originator control in usage control. POLICY'02: Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (2002), IEEE Computer Society, Washington, DC, USA
-
(2002)
POLICY'02: Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks
-
-
Park, J.1
Sandhu, R.2
-
57
-
-
38949184514
-
Toward a usage-based security framework for collaborative computing systems
-
Zhang X., Nakae M., Covington M.J., and Sandhu R. Toward a usage-based security framework for collaborative computing systems. ACM Trans. Inf. Syst. Secur. 11 1 (2008) 1-36
-
(2008)
ACM Trans. Inf. Syst. Secur.
, vol.11
, Issue.1
, pp. 1-36
-
-
Zhang, X.1
Nakae, M.2
Covington, M.J.3
Sandhu, R.4
-
58
-
-
34548043501
-
Towards a VMM-based usage control framework for OS kernel integrity protection
-
ACM, New York, NY, USA
-
Xu M., Jiang X., Sandhu R., and Zhang X. Towards a VMM-based usage control framework for OS kernel integrity protection. SACMAT'07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies (2007), ACM, New York, NY, USA 71-80
-
(2007)
SACMAT'07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies
, pp. 71-80
-
-
Xu, M.1
Jiang, X.2
Sandhu, R.3
Zhang, X.4
-
59
-
-
70350690538
-
Uclinux: A linux security module for trusted-computing-based usage controls enforcement
-
ACM, New York, NY, USA
-
Kyle D., and Brustoloni J.C. Uclinux: A linux security module for trusted-computing-based usage controls enforcement. STC'07: Proceedings of ACM Workshop on Scalable Trusted Computing (2007), ACM, New York, NY, USA 63-70
-
(2007)
STC'07: Proceedings of ACM Workshop on Scalable Trusted Computing
, pp. 63-70
-
-
Kyle, D.1
Brustoloni, J.C.2
-
60
-
-
35248846535
-
Adapting the UCON Usage Control Policies on CORBASec Infrastructure
-
IEEE Computer Society, Washington, DC, USA
-
Lung L.C., Higashiyama M.S., Obelheiro R.R., and da Silva Fraga J. Adapting the UCON Usage Control Policies on CORBASec Infrastructure. AINAW'07: Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops (2007), IEEE Computer Society, Washington, DC, USA 483-488
-
(2007)
AINAW'07: Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops
, pp. 483-488
-
-
Lung, L.C.1
Higashiyama, M.S.2
Obelheiro, R.R.3
da Silva Fraga, J.4
-
61
-
-
77952348185
-
Usage control platformization via trustworthy SELinux
-
ACM, New York, NY, USA
-
Alam M., Seifert J.-P., Li Q., and Zhang X. Usage control platformization via trustworthy SELinux. ASIACCS'08: Proceedings of ACM Symposium on Information, Computer and Communications Security (2008), ACM, New York, NY, USA 245-248
-
(2008)
ASIACCS'08: Proceedings of ACM Symposium on Information, Computer and Communications Security
, pp. 245-248
-
-
Alam, M.1
Seifert, J.-P.2
Li, Q.3
Zhang, X.4
-
62
-
-
84943519164
-
On usage control in data grids
-
to appear in the, June
-
F. Stagni, A. Arenas, B. Aziz, On usage control in data grids, to appear in the 3rd IFIP International Conference on Trust Management, TM'09, June 2009.
-
(2009)
3rd IFIP International Conference on Trust Management, TM'09
-
-
Stagni, F.1
Arenas, A.2
Aziz, B.3
-
63
-
-
52249124086
-
UCGS: A usage control approach for grid services
-
IEEE Computer Society, Washington, DC, USA
-
Mei Y., Dong X., Wu W., Guan S., and Xu J. UCGS: A usage control approach for grid services. CISW'07: Proceedings of International Conference on Computational Intelligence and Security Workshops (2007), IEEE Computer Society, Washington, DC, USA 486-489
-
(2007)
CISW'07: Proceedings of International Conference on Computational Intelligence and Security Workshops
, pp. 486-489
-
-
Mei, Y.1
Dong, X.2
Wu, W.3
Guan, S.4
Xu, J.5
-
64
-
-
46849090779
-
Ubiquitous computing environments and its usage access control
-
ACM, New York, NY, USA
-
Wang H., Zhang Y., and Cao J. Ubiquitous computing environments and its usage access control. InfoScale'06: Proceedings of the 1st International Conference on Scalable Information Systems (2006), ACM, New York, NY, USA
-
(2006)
InfoScale'06: Proceedings of the 1st International Conference on Scalable Information Systems
-
-
Wang, H.1
Zhang, Y.2
Cao, J.3
-
65
-
-
84876699372
-
-
S. Lili, L. Yan, XML schema in XML documents with usage control, Int. J. Comput. Sci. Netw. Secur
-
S. Lili, L. Yan, XML schema in XML documents with usage control, Int. J. Comput. Sci. Netw. Secur.
-
-
-
-
66
-
-
47749117634
-
Modeling and enforcing advanced access control policies in healthcare systems with sectet
-
Springer, Berlin/Heidelberg
-
Hafner M., Memon M., and Alam M. Modeling and enforcing advanced access control policies in healthcare systems with sectet. Models in Software Engineering (2008), Springer, Berlin/Heidelberg 132-144
-
(2008)
Models in Software Engineering
, pp. 132-144
-
-
Hafner, M.1
Memon, M.2
Alam, M.3
-
67
-
-
38949086865
-
Administrative usage control model for secure interoperability
-
IEEE Computer Society, Washington, DC, USA
-
Hong F., and Cui Y. Administrative usage control model for secure interoperability. PDCAT'06: Proceedings of the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (2006), IEEE Computer Society, Washington, DC, USA 86-89
-
(2006)
PDCAT'06: Proceedings of the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies
, pp. 86-89
-
-
Hong, F.1
Cui, Y.2
-
68
-
-
37249072794
-
Enhancing optimistic access controls with usage control
-
K. Padayachee, J.H.P. Eloff, Enhancing optimistic access controls with usage control, in: TrustBus, 2007, pp. 75-82.
-
(2007)
TrustBus
, pp. 75-82
-
-
Padayachee, K.1
Eloff, J.H.P.2
-
69
-
-
84888279035
-
Enforcing DRM policies across applications
-
S.K. Nair, G. Gheorghe, B. Crispo, A.S. Tanenbaum, Enforcing DRM policies across applications, in: 8th ACM DRM Workshop, DRM 2008, 2008.
-
(2008)
8th ACM DRM Workshop, DRM
-
-
Nair, S.K.1
Gheorghe, G.2
Crispo, B.3
Tanenbaum, A.S.4
-
70
-
-
37849050601
-
Towards a times-based usage control model
-
DBSec. Barker S., and Ahn G.-J. (Eds), Springer
-
Zhao B., Sandhu R.S., Zhang X., and Qin X. Towards a times-based usage control model. In: Barker S., and Ahn G.-J. (Eds). DBSec. Lecture Notes in Computer Science vol. 4602 (2007), Springer 227-242
-
(2007)
Lecture Notes in Computer Science
, vol.4602
, pp. 227-242
-
-
Zhao, B.1
Sandhu, R.S.2
Zhang, X.3
Qin, X.4
-
71
-
-
79951530946
-
A role-based dynamic authorization model and its implementation in PMI
-
IEEE Computer Society, Washington, DC, USA
-
Xie H., Zhang B., and Hu D. A role-based dynamic authorization model and its implementation in PMI. CSSE'08: Proceedings of the 2008 International Conference on Computer Science and Software Engineering (2008), IEEE Computer Society, Washington, DC, USA 661-664
-
(2008)
CSSE'08: Proceedings of the 2008 International Conference on Computer Science and Software Engineering
, pp. 661-664
-
-
Xie, H.1
Zhang, B.2
Hu, D.3
-
72
-
-
60349100683
-
Times-based usage control model and its implication
-
IEEE Computer Society, Washington, DC, USA
-
Fang J., and Zou J. Times-based usage control model and its implication. SECTECH'08: Proceedings of the 2008 International Conference on Security Technology (2008), IEEE Computer Society, Washington, DC, USA 190-193
-
(2008)
SECTECH'08: Proceedings of the 2008 International Conference on Security Technology
, pp. 190-193
-
-
Fang, J.1
Zou, J.2
-
73
-
-
58149123523
-
Usage control resource dissemination model based on fuzzy logic
-
IEEE Computer Society, Washington, DC, USA
-
Wang F., Zhao L., Li C., Cheng Z., and Zhang Q. Usage control resource dissemination model based on fuzzy logic. FSKD'08: Proceedings of the 2008 Fifth International Conference on Fuzzy Systems and Knowledge Discovery (2008), IEEE Computer Society, Washington, DC, USA 454-458
-
(2008)
FSKD'08: Proceedings of the 2008 Fifth International Conference on Fuzzy Systems and Knowledge Discovery
, pp. 454-458
-
-
Wang, F.1
Zhao, L.2
Li, C.3
Cheng, Z.4
Zhang, Q.5
-
74
-
-
51849135088
-
Concurrent enforcement of usage control policies
-
H. Janicke, A. Cau, F.A. Siewe, H. Zedan, Concurrent enforcement of usage control policies, in: POLICY 2008: IEEE Workshop on Policies for Distributed Systems and Networks, 2008, pp. 111-118.
-
(2008)
POLICY 2008: IEEE Workshop on Policies for Distributed Systems and Networks
, pp. 111-118
-
-
Janicke, H.1
Cau, A.2
Siewe, F.A.3
Zedan, H.4
-
75
-
-
50949130846
-
Security enforcement model for distributed usage control
-
X. Zhang, J.-P. Seifert, R. Sandhu, Security enforcement model for distributed usage control, in: SUTC'08: IEEE International Conference on Sensor Networks, Ubiquitous and Trustworthy Computing, 2008.
-
(2008)
SUTC'08: IEEE International Conference on Sensor Networks, Ubiquitous and Trustworthy Computing
-
-
Zhang, X.1
Seifert, J.-P.2
Sandhu, R.3
-
76
-
-
48349118304
-
The research and application of resource dissemination based on credibility and UCON
-
IEEE Computer Society, Washington, DC, USA
-
Wang F., and Wang F. The research and application of resource dissemination based on credibility and UCON. CIS'07: Proceedings of the 2007 International Conference on Computational Intelligence and Security (2007), IEEE Computer Society, Washington, DC, USA 584-588
-
(2007)
CIS'07: Proceedings of the 2007 International Conference on Computational Intelligence and Security
, pp. 584-588
-
-
Wang, F.1
Wang, F.2
-
77
-
-
36348975032
-
Design of secure CAMIN application system based on dependable and secure TMO and RT-UCON
-
IEEE Computer Society, Washington, DC, USA
-
Kim J., and Thuraisingham B. Design of secure CAMIN application system based on dependable and secure TMO and RT-UCON. ISORC'07: Proceedings of the 10th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (2007), IEEE Computer Society, Washington, DC, USA 146-155
-
(2007)
ISORC'07: Proceedings of the 10th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing
, pp. 146-155
-
-
Kim, J.1
Thuraisingham, B.2
-
78
-
-
77950867762
-
Integrating usage control with SIP-based communications
-
Barka E., and Lakas A. Integrating usage control with SIP-based communications. J. Comput. Syst., Netw., Comm. 2008 3 (2008) 1-8
-
(2008)
J. Comput. Syst., Netw., Comm.
, vol.2008
, Issue.3
, pp. 1-8
-
-
Barka, E.1
Lakas, A.2
-
79
-
-
77950857720
-
DRM Application in UCON
-
IEEE Computer Society, Washington, DC, USA
-
Ding Y., and Zou J. DRM Application in UCON. ASEA'08: Proceedings of the 2008 Advanced Software Engineering and Its Applications (2008), IEEE Computer Society, Washington, DC, USA 182-185
-
(2008)
ASEA'08: Proceedings of the 2008 Advanced Software Engineering and Its Applications
, pp. 182-185
-
-
Ding, Y.1
Zou, J.2
|