Digital rights management for content distribution
ACSW Frontiers '03 Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003 - Volume 21
The UCONABC usage control model
ACM Transactions on Information and System Security (TISSEC)
A logical specification for usage control
Proceedings of the ninth ACM symposium on Access control models and technologies
A distributed digital rights management model for secure information-distribution systems
International Journal of Information Security
Communications of the ACM - Privacy and security in highly dynamic systems
Audit-based compliance control
International Journal of Information Security
A posteriori compliance control
Proceedings of the 12th ACM symposium on Access control models and technologies
Uclinux: a linux security module for trusted-computing-based usage controls enforcement
Proceedings of the 2007 ACM workshop on Scalable trusted computing
Security policy compliance with violation management
Proceedings of the 2007 ACM workshop on Formal methods in security engineering
Usage control platformization via trustworthy SELinux
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Security Enforcement Model for Distributed Usage Control
SUTC '08 Proceedings of the 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008)
A general obligation model and continuity: enhanced policy enforcement engine for usage control
Proceedings of the 13th ACM symposium on Access control models and technologies
Evaluating the usability of usage controls in electronic collaboration
Proceedings of the 4th symposium on Usable privacy and security
Usage Control Enforcement: Present and Future
IEEE Security and Privacy
Behavioral attestation for web services (BA4WS)
Proceedings of the 2008 ACM workshop on Secure web services
The 'how' and 'why' of persistent information security
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Secure web-based retrieval of documents with usage controls
Proceedings of the 2009 ACM symposium on Applied Computing
L-UCON: Towards Layered Access Control with UCON
CSE '09 Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 02
A practical property-based bootstrap architecture
Proceedings of the 2009 ACM workshop on Scalable trusted computing
Infringo ergo sum: when will software engineering support infringements?
Proceedings of the FSE/SDP workshop on Future of software engineering research
TrustBus'10 Proceedings of the 7th international conference on Trust, privacy and security in digital business
Enforcing UCON policies on the enterprise service bus
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems: Part II
Distributed data usage control for web applications: a social network implementation
Proceedings of the first ACM conference on Data and application security and privacy
Securing data accountability in decentralized systems
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Survey: Usage control in computer security: A survey
Computer Science Review
Usage control in service-oriented architectures
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
Hi-index | 0.00 |
Sharing information allows businesses to take advantage of hidden knowledge, improve work processes and cooperation both within and across organisations. Thus there is a need for improved information protection capable of restricting how information is used, as opposed to only accessed. Usage Control has been proposed to achieve this by combining and extending traditional access control, Digital Rights Management and various encryption schemes. Advances in usage control enforcement has received considerable attention from the research community and we therefore believe there is a need to synthesise these efforts to minimise the potential for overlap. This paper surveys the previous efforts on providing usage control enforcement and analyses the general strengths and weaknesses of these approaches. In this paper we demonstrate that there are several promising mechanisms for enforcing usage control, but that reliable empirical evidence is required in order to ensure the appropriateness and usability of the enforcement mechanisms.