메뉴 건너뛰기




Volumn 4, Issue 2, 2010, Pages 81-99

Usage control in computer security: A survey

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL MODELS; COMPUTER ENVIRONMENTS; COMPUTING ENVIRONMENTS; DIGITAL RIGHTS MANAGEMENT; DISCRETIONARY ACCESS CONTROL; MANDATORY ACCESS CONTROL; MODERN COMPUTER SYSTEMS; ROLE-BASED ACCESS CONTROL;

EID: 77950864309     PISSN: 15740137     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cosrev.2010.02.002     Document Type: Article
Times cited : (116)

References (79)
  • 5
    • 34249811174 scopus 로고    scopus 로고
    • A survey of trust in computer science and the semantic web
    • Artz D., and Gil Y. A survey of trust in computer science and the semantic web. Web Semant. 5 2 (2007) 58-71
    • (2007) Web Semant. , vol.5 , Issue.2 , pp. 58-71
    • Artz, D.1    Gil, Y.2
  • 8
    • 35248873795 scopus 로고    scopus 로고
    • Usage control: A vision for next generation access control
    • MMM-ACNS, Springer
    • Sandhu R.S., and Park J. Usage control: A vision for next generation access control. MMM-ACNS. Lecture Notes in Computer Science vol. 2776 (2003), Springer 17-31
    • (2003) Lecture Notes in Computer Science , vol.2776 , pp. 17-31
    • Sandhu, R.S.1    Park, J.2
  • 12
    • 3142523603 scopus 로고    scopus 로고
    • The UCON ABC usage control model
    • Park J., and Sandhu R. The UCON ABC usage control model. ACM Trans. Inf. Syst. Secur. 7 1 (2004) 128-174
    • (2004) ACM Trans. Inf. Syst. Secur. , vol.7 , Issue.1 , pp. 128-174
    • Park, J.1    Sandhu, R.2
  • 16
    • 33845230194 scopus 로고    scopus 로고
    • Survey on the technological aspects of digital rights management
    • Ku W., and Chi C.-H. Survey on the technological aspects of digital rights management. Information Security (2004) 391-403
    • (2004) Information Security , pp. 391-403
    • Ku, W.1    Chi, C.-H.2
  • 17
    • 84902461453 scopus 로고    scopus 로고
    • Attribute mutability in usage control
    • Kluwer
    • Park J., Zhang X., and Sandhu R.S. Attribute mutability in usage control. DBSec (2004), Kluwer 15-29
    • (2004) DBSec , pp. 15-29
    • Park, J.1    Zhang, X.2    Sandhu, R.S.3
  • 18
    • 38549141554 scopus 로고    scopus 로고
    • Secured web services based on extended usage control
    • PAKDD Workshops, Springer
    • Shin W., and Yoo S.B. Secured web services based on extended usage control. PAKDD Workshops. Lecture Notes in Computer Science vol. 4819 (2007), Springer 656-663
    • (2007) Lecture Notes in Computer Science , vol.4819 , pp. 656-663
    • Shin, W.1    Yoo, S.B.2
  • 20
    • 77950866990 scopus 로고    scopus 로고
    • A new modeling paradigm for dynamic authorization in multi-domain systems
    • Springer, Berlin, Heidelberg
    • Sastry M., Krishnan R., and Sandhu R. A new modeling paradigm for dynamic authorization in multi-domain systems. Communications in Computer and Information Science vol. 1 (2007), Springer, Berlin, Heidelberg 153-158
    • (2007) Communications in Computer and Information Science , vol.1 , pp. 153-158
    • Sastry, M.1    Krishnan, R.2    Sandhu, R.3
  • 24
  • 31
    • 0028424892 scopus 로고
    • The temporal logic of actions
    • Lamport L. The temporal logic of actions. ACM Trans. Program. Lang. Syst. 16 3 (1994) 872-923
    • (1994) ACM Trans. Program. Lang. Syst. , vol.16 , Issue.3 , pp. 872-923
    • Lamport, L.1
  • 40
    • 37249079159 scopus 로고    scopus 로고
    • Usage control in service-oriented architectures
    • TrustBus. Lambrinoudakis C., Pernul G., and Tjoa A.M. (Eds), Springer
    • Pretschner A., Massacci F., and Hilty M. Usage control in service-oriented architectures. In: Lambrinoudakis C., Pernul G., and Tjoa A.M. (Eds). TrustBus. Lecture Notes in Computer Science vol. 4657 (2007), Springer 83-93
    • (2007) Lecture Notes in Computer Science , vol.4657 , pp. 83-93
    • Pretschner, A.1    Massacci, F.2    Hilty, M.3
  • 43
    • 57049101532 scopus 로고    scopus 로고
    • A Model for Usage Control in GRID systems
    • IEEE Press
    • Martinelli F., and Mori P. A Model for Usage Control in GRID systems. Proceedings of GRID-STP (2007), IEEE Press
    • (2007) Proceedings of GRID-STP
    • Martinelli, F.1    Mori, P.2
  • 46
    • 68449090010 scopus 로고    scopus 로고
    • Enhancing grid security by fine-grained behavioral control and negotiation-based authorization
    • Koshutanski H., Lazouski A., Martinelli F., and Mori P. Enhancing grid security by fine-grained behavioral control and negotiation-based authorization. Int. J. Inform. Secur. 8 4 (2009) 291-314
    • (2009) Int. J. Inform. Secur. , vol.8 , Issue.4 , pp. 291-314
    • Koshutanski, H.1    Lazouski, A.2    Martinelli, F.3    Mori, P.4
  • 48
    • 33845517298 scopus 로고    scopus 로고
    • Security analysis in role-based access control
    • Li N., and Tripunitara M.V. Security analysis in role-based access control. ACM Trans. Inf. Syst. Secur. 9 4 (2006) 391-420
    • (2006) ACM Trans. Inf. Syst. Secur. , vol.9 , Issue.4 , pp. 391-420
    • Li, N.1    Tripunitara, M.V.2
  • 49
    • 0038825043 scopus 로고    scopus 로고
    • Beyond proof-of-compliance: Safety and availability analysis in trust management
    • IEEE Computer Society Press
    • Li N., and Mitchell J.C. Beyond proof-of-compliance: Safety and availability analysis in trust management. Proceedings of IEEE Symposium on Security and Privacy (2003), IEEE Computer Society Press 123-139
    • (2003) Proceedings of IEEE Symposium on Security and Privacy , pp. 123-139
    • Li, N.1    Mitchell, J.C.2
  • 52
    • 84876720273 scopus 로고    scopus 로고
    • ITU-T Recommendation X.812, security frameworks for open systems: Access control framework, in: ISO/IEC 10181-3, Int'l Telecomm. Union, Geneva, 1996.
    • ITU-T Recommendation X.812, security frameworks for open systems: Access control framework, in: ISO/IEC 10181-3, Int'l Telecomm. Union, Geneva, 1996.
  • 54
    • 85010312197 scopus 로고    scopus 로고
    • Usage control model and architecture for data confidentiality in a database service provider
    • Amril S., Toshihiro T., and Kouichi S. Usage control model and architecture for data confidentiality in a database service provider. Trans. Inform. Process. Soc. Japan 47 2 (2006) 621-626
    • (2006) Trans. Inform. Process. Soc. Japan , vol.47 , Issue.2 , pp. 621-626
    • Amril, S.1    Toshihiro, T.2    Kouichi, S.3
  • 57
    • 38949184514 scopus 로고    scopus 로고
    • Toward a usage-based security framework for collaborative computing systems
    • Zhang X., Nakae M., Covington M.J., and Sandhu R. Toward a usage-based security framework for collaborative computing systems. ACM Trans. Inf. Syst. Secur. 11 1 (2008) 1-36
    • (2008) ACM Trans. Inf. Syst. Secur. , vol.11 , Issue.1 , pp. 1-36
    • Zhang, X.1    Nakae, M.2    Covington, M.J.3    Sandhu, R.4
  • 59
    • 70350690538 scopus 로고    scopus 로고
    • Uclinux: A linux security module for trusted-computing-based usage controls enforcement
    • ACM, New York, NY, USA
    • Kyle D., and Brustoloni J.C. Uclinux: A linux security module for trusted-computing-based usage controls enforcement. STC'07: Proceedings of ACM Workshop on Scalable Trusted Computing (2007), ACM, New York, NY, USA 63-70
    • (2007) STC'07: Proceedings of ACM Workshop on Scalable Trusted Computing , pp. 63-70
    • Kyle, D.1    Brustoloni, J.C.2
  • 65
    • 84876699372 scopus 로고    scopus 로고
    • S. Lili, L. Yan, XML schema in XML documents with usage control, Int. J. Comput. Sci. Netw. Secur
    • S. Lili, L. Yan, XML schema in XML documents with usage control, Int. J. Comput. Sci. Netw. Secur.
  • 66
    • 47749117634 scopus 로고    scopus 로고
    • Modeling and enforcing advanced access control policies in healthcare systems with sectet
    • Springer, Berlin/Heidelberg
    • Hafner M., Memon M., and Alam M. Modeling and enforcing advanced access control policies in healthcare systems with sectet. Models in Software Engineering (2008), Springer, Berlin/Heidelberg 132-144
    • (2008) Models in Software Engineering , pp. 132-144
    • Hafner, M.1    Memon, M.2    Alam, M.3
  • 68
    • 37249072794 scopus 로고    scopus 로고
    • Enhancing optimistic access controls with usage control
    • K. Padayachee, J.H.P. Eloff, Enhancing optimistic access controls with usage control, in: TrustBus, 2007, pp. 75-82.
    • (2007) TrustBus , pp. 75-82
    • Padayachee, K.1    Eloff, J.H.P.2
  • 70
    • 37849050601 scopus 로고    scopus 로고
    • Towards a times-based usage control model
    • DBSec. Barker S., and Ahn G.-J. (Eds), Springer
    • Zhao B., Sandhu R.S., Zhang X., and Qin X. Towards a times-based usage control model. In: Barker S., and Ahn G.-J. (Eds). DBSec. Lecture Notes in Computer Science vol. 4602 (2007), Springer 227-242
    • (2007) Lecture Notes in Computer Science , vol.4602 , pp. 227-242
    • Zhao, B.1    Sandhu, R.S.2    Zhang, X.3    Qin, X.4
  • 78
    • 77950867762 scopus 로고    scopus 로고
    • Integrating usage control with SIP-based communications
    • Barka E., and Lakas A. Integrating usage control with SIP-based communications. J. Comput. Syst., Netw., Comm. 2008 3 (2008) 1-8
    • (2008) J. Comput. Syst., Netw., Comm. , vol.2008 , Issue.3 , pp. 1-8
    • Barka, E.1    Lakas, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.