Experiences with the enforcement of access rights extracted from ODRL-based digital contracts
Proceedings of the 3rd ACM workshop on Digital rights management
Towards a dynamic multi-policy dissemination control model: (DMDCON)
ACM SIGMOD Record
Secure information sharing enabled by Trusted Computing and PEI models
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
A posteriori compliance control
Proceedings of the 12th ACM symposium on Access control models and technologies
Foundations for group-centric secure information sharing models
Proceedings of the 14th ACM symposium on Access control models and technologies
An Access Control Language for a General Provenance Model
SDM '09 Proceedings of the 6th VLDB Workshop on Secure Data Management
Policy Evolution in Distributed Usage Control
Electronic Notes in Theoretical Computer Science (ENTCS)
An administrative model for UCONABC
AISC '10 Proceedings of the Eighth Australasian Conference on Information Security - Volume 105
Group-centric models for secure and agile information sharing
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
Proceedings of the 2011 Workshop on Governance of Technology, Information, and Policies
ShareEnabler: policy-driven access management for ad-hoc collaborative sharing
EDBT'06 Proceedings of the 2006 international conference on Current Trends in Database Technology
Survey: Usage control in computer security: A survey
Computer Science Review
Supporting Secure Information Flow: An Engineering Approach
International Journal of e-Collaboration
Hi-index | 0.00 |
Originator Control is an access control policy thatrequires recipients to gain originator's approval for re-disseminationof disseminated digital object. Originatorcontrol policies are one of the generic and key concerns ofusage control. Usage control is an emerging concept whichencompasses traditional access control and digital rightsmanagement solutions. However, current commercialDigital Rights Management (DRM) solutions lackenforcement of access control policies such as role-basedaccess control (RBAC), mandatory access control (MAC),discretionary access control (DAC) and originator controlbecause their control of access to digital object is mainlybased on payment.In this paper, we attempt to combine originator controlpolicies and usage control. Then we show how this canextend traditional originator control solutions to enforceaccess control policies even outside of a local controlenvironment where a central control authority is notavailable. License and ticket concepts are proposed andused for originator control in usage control. Also, wedefine seven different solution approaches to deal withvarious dissemination situations. In addition, we discusssome published DRM solutions and relate these to oursolution approaches.