L-UCON: Towards Layered Access Control with UCON

  • Authors:
  • Hao Hu;Hao Li;Dengguo Feng

  • Affiliations:
  • -;-;-

  • Venue:
  • CSE '09 Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 02
  • Year:
  • 2009
  • Usage control enforcement - a survey

    ARES'11 Proceedings of the IFIP WG 8.4/8.9 international cross domain conference on Availability, reliability and security for business, enterprise and health information systems

Quantified Score

Hi-index 0.00

Visualization

Abstract

Traditional access control solutions suffer from difficulties in access rights authorization and usage policy enforcement, especially in highly distributed environments. The layered nature of common digital content should also be exploited to efficiently provide the user with choices over digital content layers. This paper presents a layered access control architecture L-UCON based on usage control model UCON and trusted computing. We are motivated to design L-UCON as a general access solution by binding policies to usage-controlled digital content. Moreover, L-UCON is a negotiable solution caring about both the user’s and the owner’s benefits. Test results show that performance of L-UCON is acceptable.