Role-Based Access Control Models
Computer
Lattice-Based Access Control Models
Computer
Models and Languages for Digital Rights
HICSS '01 Proceedings of the 34th Annual Hawaii International Conference on System Sciences ( HICSS-34)-Volume 9 - Volume 9
PCASSO: applying and extending state-of-the-art security in the healthcare domain
ACSAC '97 Proceedings of the 13th Annual Computer Security Applications Conference
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Understanding Trust Management Systems
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
DigiBox: a self-protecting container for information commerce
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
Modeling Privacy Control in Context-Aware Systems
IEEE Pervasive Computing
Partial outsourcing: a new paradigm for access control
Proceedings of the eighth ACM symposium on Access control models and technologies
Originator Control in Usage Control
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Experiences with the enforcement of access rights extracted from ODRL-based digital contracts
Proceedings of the 3rd ACM workshop on Digital rights management
An access control framework for business processes for web services
Proceedings of the 2003 ACM workshop on XML security
The UCONABC usage control model
ACM Transactions on Information and System Security (TISSEC)
Real-time update of access control policies
Data & Knowledge Engineering
Applying Semantic Knowledge to Real-Time Update of Access Control Policies
IEEE Transactions on Knowledge and Data Engineering
Towards a dynamic multi-policy dissemination control model: (DMDCON)
ACM SIGMOD Record
Ubiquitous computing environments and its usage access control
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
A posteriori compliance control
Proceedings of the 12th ACM symposium on Access control models and technologies
A general obligation model and continuity: enhanced policy enforcement engine for usage control
Proceedings of the 13th ACM symposium on Access control models and technologies
Model-based behavioral attestation
Proceedings of the 13th ACM symposium on Access control models and technologies
Access control management for ubiquitous computing
Future Generation Computer Systems
Preventing information leakage between collaborating organisations
Proceedings of the 10th international conference on Electronic commerce
Sharing but Protecting Content Against Internal Leakage for Organisations
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Behavioral attestation for web services (BA4WS)
Proceedings of the 2008 ACM workshop on Secure web services
Towards Automated Privacy Compliance in the Information Life Cycle
Advances in Web Semantics I
Integrating usage control with SIP-based communications
Journal of Computer Systems, Networks, and Communications
Remote Attestation of Attribute Updates and Information Flows in a UCON System
Trust '09 Proceedings of the 2nd International Conference on Trusted Computing
An Access Control Language for a General Provenance Model
SDM '09 Proceedings of the 6th VLDB Workshop on Secure Data Management
Trusted resource dissemination in Internetware systems
Proceedings of the First Asia-Pacific Symposium on Internetware
Semantic Usage Policies for Web Services
ISWC '09 Proceedings of the 8th International Semantic Web Conference
Sh@re: negotiated audit in social networks
SMC'09 Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics
A new model for continuous network access control of trusted network connection
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Secured web services based on extended usage control
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
Access control requirements for processing electronic health records
BPM'07 Proceedings of the 2007 international conference on Business process management
Autonomic policy adaptation using decentralized online clustering
Proceedings of the 7th international conference on Autonomic computing
Journal of Theoretical and Applied Electronic Commerce Research
New role-based access control in ubiquitous e-business environment
Journal of Intelligent Manufacturing
An administrative model for UCONABC
AISC '10 Proceedings of the Eighth Australasian Conference on Information Security - Volume 105
Policy auditing over incomplete logs: theory, implementation and applications
Proceedings of the 18th ACM conference on Computer and communications security
Influence of attribute freshness on decision making in usage control
STM'10 Proceedings of the 6th international conference on Security and trust management
Towards secure XML document with usage control
APWeb'05 Proceedings of the 7th Asia-Pacific web conference on Web Technologies Research and Development
UCONLEGAL: a usage control model for HIPAA
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium
On practical specification and enforcement of obligations
Proceedings of the second ACM conference on Data and Application Security and Privacy
A formal privacy system and its application to location based services
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
License protection with a tamper-resistant token
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Securing data accountability in decentralized systems
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Interactive credential negotiation for stateful business processes
iTrust'05 Proceedings of the Third international conference on Trust Management
ShareEnabler: policy-driven access management for ad-hoc collaborative sharing
EDBT'06 Proceedings of the 2006 international conference on Current Trends in Database Technology
Protecting disseminative information in E-Learning
ICWL'07 Proceedings of the 6th international conference on Advances in web based learning
Scalable remote attestation with privacy protection
INTRUST'09 Proceedings of the First international conference on Trusted Systems
Understanding and protecting privacy: formal semantics and principled audit mechanisms
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Privacy preserving picture sharing: enforcing usage control in distributed on-line social networks
Proceedings of the Fifth Workshop on Social Network Systems
Proceedings of the 50th Annual Southeast Regional Conference
A purpose-based access control in native XML databases
Concurrency and Computation: Practice & Experience
PlexC: a policy language for exposure control
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
Survey: Usage control in computer security: A survey
Computer Science Review
Challenging issues of UCON in modern computing environments
Proceedings of the Fifth Balkan Conference in Informatics
Usage control model specification in XACML policy language
CISIM'12 Proceedings of the 11th IFIP TC 8 international conference on Computer Information Systems and Industrial Management
Data usage control enforcement in distributed systems
Proceedings of the third ACM conference on Data and application security and privacy
FENCE: continuous access control enforcement in dynamic data stream environments
Proceedings of the third ACM conference on Data and application security and privacy
A new approach for delegation in usage control
Proceedings of the third ACM conference on Data and application security and privacy
On the automated analysis of safety in usage control: a new decidability result
NSS'12 Proceedings of the 6th international conference on Network and System Security
Supporting Secure Information Flow: An Engineering Approach
International Journal of e-Collaboration
Behavioral Attestation for Web Services using access policies
Multimedia Tools and Applications
Towards purpose enforcement model for privacy-aware usage control policy in distributed healthcare
International Journal of Security and Networks
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication
Hi-index | 0.00 |
In this paper we develop the concept of Usage Control (UCON) that encompasses traditional access control, trust management, and digital rights management and goes beyond them in its definition and scope. While usage control concepts have been mentioned off and on in the security literature for some time, there has been no systematic treatment so far. By unifying these three areas UCON offers a promising approach for the next generation of access control. Traditional access control has focused on a closed system where all users are known and primarily utilizes a server-side reference monitor within the system. Trust management has been introduced to cover authorization for strangers in an open environment such as the Internet. Digital rights management has dealt with client-side control of digital information usage. Each of these areas is motivated by its own target problems. Innovations in information technology and business models are creating new security and privacy issues which require elements of all three areas. To deal with these in a systematic unified manner we propose the new UCON model. UCON enables finer-grained control over usage of digital objects than that of traditional access control policies and models. For example, print once as opposed to unlimited prints. Unlike traditional access control or trust management, it covers both centrally controllable environment and an environment where central control authority is not available. UCON also deals with privacy issues in both commercial and non-commercial environments. In this paper we first discuss access control, trust management, and digital rights management and describe general concepts of UCON in the information security discipline. Then we define components of the UCON model and discuss how authorizations and access controls can be applied in the UCON model. Next we demonstrate some applications of the UCON model and develop further details. We use several examples during these discussions to show the relevance and validity of our approach. Finally we identify some open research issues.