Communicating sequential processes
Communications of the ACM
The role of trust management in distributed systems security
Secure Internet programming
KeyNote: Trust Management for Public-Key Infrastructures (Position Paper)
Proceedings of the 6th International Workshop on Security Protocols
The UCONABC usage control model
ACM Transactions on Information and System Security (TISSEC)
Towards Continuous Usage Control on Grid Computational Services
ICAS-ICNS '05 Proceedings of the Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services
Formal model and policy specification of usage control
ACM Transactions on Information and System Security (TISSEC)
Toward a Usage-Based Security Framework for Collaborative Computing Systems
ACM Transactions on Information and System Security (TISSEC)
Usage Control Enforcement: Present and Future
IEEE Security and Privacy
Policy Evolution in Distributed Usage Control
Electronic Notes in Theoretical Computer Science (ENTCS)
On usage control for GRID systems
Future Generation Computer Systems
Distributed usage control architecture for business coalitions
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Hi-index | 0.00 |
Distributed systems, such as the Cloud, are widely used for solving large problems, because they provide big computational power at a low cost. From the security point of view, distributed systems pose new challenges, because the applications running on the components of the system could cooperate to access the system's resources. Hence, the security support should consider all the accesses performed by the applications run by the same user on distinct nodes of a distributed system as the behaviour of that user. To address this problem, this paper proposes mobile usage control policies that, besides regulating the usage of the system resources, also define the exchange of some policy fragments among the nodes of the distributed system. In this way, the usage of resources performed on one node of the distributed system affects the right of accessing resources on other nodes of the system. A reference scenario where mobile usage control policies could be successfully adopted is the Cloud environment.