Generative communication in Linda
ACM Transactions on Programming Languages and Systems (TOPLAS)
Proceedings of the 21st international conference on Software engineering
XML document security based on provisional authorization
Proceedings of the 7th ACM conference on Computer and communications security
Solving the LINDA Multiple rd Problem
COORDINATION '96 Proceedings of the First International Conference on Coordination Languages and Models
XrML -- eXtensible rights Markup Language
Proceedings of the 2002 ACM workshop on XML security
Tuples On The Air: A Middleware for Context-Aware Computing in Dynamic Networks
ICDCSW '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Obligation Monitoring in Policy Management
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
The UCONABC usage control model
ACM Transactions on Information and System Security (TISSEC)
Authorisation and Conflict Resolution for Hierarchical Domains
POLICY '07 Proceedings of the Eighth IEEE International Workshop on Policies for Distributed Systems and Networks
Modelling mobility in disaster area scenarios
Proceedings of the 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems
An opportunistic authority evaluation scheme for data security in crisis management scenarios
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Coordinating workflow allocation and execution in mobile environments
COORDINATION'07 Proceedings of the 9th international conference on Coordination models and languages
POLICY'09 Proceedings of the 10th IEEE international conference on Policies for distributed systems and networks
Hi-index | 0.00 |
Controlling data usage in a crisis scenario is a particularly acute issue due to the sensitive nature of the data being distributed. Typical access control mechanisms rely on a centralised architecture where access policies are stored and evaluated. However, such architecture is not practical in a crisis scenario due to the absence or the impossibility of using a wide-area communication infrastructure. In this paper, we introduce xDUCON a framework for enforcing usage control policies that relies on the Shared Data Space (SDS) abstraction for the coordination of policy evaluation and enforcement. Policies are represented as tuples to facilitate their propagation across the available infrastructure.