A technical architecture for enforcing usage control requirements in service-oriented architectures
Proceedings of the 2007 ACM workshop on Secure web services
Survey: Usage control in computer security: A survey
Computer Science Review
A policy language for distributed usage control
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Hi-index | 0.00 |
Usage control is concerned with control over data after its release to third parties, and includes requirements such as "this data must be deleted after 30 days" and "this data may be used for statistical purposes only". With the ultimate goal of respective policy languages that go beyond current technology for DRM of intellectual property, we provide (1) a catalog of requirements that are specific to the domains of mobile and ubiquitous computing applications, and (2) a classification of mobile and ubiquitous computing application scenarios that involve usage control, including a description of different kinds of involved data.