A calculus for access control in distributed systems
ACM Transactions on Programming Languages and Systems (TOPLAS)
A lattice model of secure information flow
Communications of the ACM
Protection in operating systems
Communications of the ACM
Good-Enough Security: Toward a Pragmatic Business-Driven Discipline
IEEE Internet Computing
ACM SIGOPS Operating Systems Review
Design of a Role-Based Trust-Management Framework
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
The UCONABC usage control model
ACM Transactions on Information and System Security (TISSEC)
Computer Security in the Real World
Computer
Secure information sharing enabled by Trusted Computing and PEI models
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Communications of the ACM - Privacy and security in highly dynamic systems
Design and implementation of a TCG-based integrity measurement architecture
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Behavioral attestation for web services (BA4WS)
Proceedings of the 2008 ACM workshop on Secure web services
Usage control enforcement - a survey
ARES'11 Proceedings of the IFIP WG 8.4/8.9 international cross domain conference on Availability, reliability and security for business, enterprise and health information systems
Defamation-free networks through user-centered data control:
STM'10 Proceedings of the 6th international conference on Security and trust management
Survey: Usage control in computer security: A survey
Computer Science Review
Behavioral Attestation for Web Services using access policies
Multimedia Tools and Applications
Hi-index | 0.00 |
Continuous access control after an object is released into a distributed environment has been regarded as the usage control problem and has been investigated by different researchers in various papers. However, the enabling technology for usage control is a challenging problem and the space has not been fully explored yet. In this paper we identify the general requirements of a trusted usage control enforcement in heterogeneous computing environments, and also propose a general platform architecture to meet these requirements.