Survey: Usage control in computer security: A survey
Computer Science Review
Hi-index | 0.00 |
Some Modern information systems require temporal and privilege consuming usage of digital objects, but Usage Control Model (UCON) can’t resolve it most conveniently. So in order to meet these requirements, the author introduces a new access control model–Times-based Usage Control (TUCON). First, the paper introduces the TUCON model and then gives the working flow of the TUCON. Finally the implementation of TUCON is explored.