Usage Control Requirements in Mobile and Ubiquitous Computing Applications

  • Authors:
  • Manuel Hilty;Alexander Pretschner;Christian Schaefer;Thomas Walter

  • Affiliations:
  • Information Security Group, ETH Zurich, 8092 Zurich, Switzerland;Information Security Group, ETH Zurich, 8092 Zurich, Switzerland;Information Security Group, ETH Zurich, 8092 Zurich, Switzerland;DoCoMo Euro-Labs, 80687 Munich, Germany

  • Venue:
  • ICSNC '06 Proceedings of the International Conference on Systems and Networks Communication
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Usage control is concerned with control over data after its release to third parties, and includes requirements such as "this data must be deleted after 30 days" and "this data may be used for statistical purposes only". With the ultimate goal of respective policy languages that go beyond current technology for DRM of intellectual property, we provide (1) a catalog of requirements that are specific to the domains of mobile and ubiquitous computing applications, and (2) a classification of mobile and ubiquitous computing application scenarios that involve usage control, including a description of different kinds of involved data.