Distributed usage control
A Pretschner, M Hilty, D Basin - Communications of the ACM, 2006 - dl.acm.org
Distributed usage control Page 1 44 September 2006/Vol. 49, No. 9 COMMUNICATIONS OF
THE ACM Page 2 COMMUNICATIONS OF THE ACM September 2006/Vol. 49, No. 9 39 …
THE ACM Page 2 COMMUNICATIONS OF THE ACM September 2006/Vol. 49, No. 9 39 …
Mechanisms for usage control
A Pretschner, M Hilty, D Basin, C Schaefer… - Proceedings of the 2008 …, 2008 - dl.acm.org
Mechanisms for usage control Page 1 Mechanisms for Usage Control A. Pretschner, M. Hilty,
D. Basin Information Security, ETH Zurich, Switzerland {pretscha,hiltym,basin}@inf.ethz.ch C …
D. Basin Information Security, ETH Zurich, Switzerland {pretscha,hiltym,basin}@inf.ethz.ch C …
Formal model and policy specification of usage control
The recent usage control model (UCON) is a foundation for next-generation access control
models with distinguishing properties of decision continuity and attribute mutability. A usage …
models with distinguishing properties of decision continuity and attribute mutability. A usage …
A policy language for distributed usage control
M Hilty, A Pretschner, D Basin, C Schaefer… - … Security–ESORICS 2007 …, 2007 - Springer
Abstract We present the Obligation Specification Language (OSL), a policy language for
distributed usage control. OSL supports the formalization of a wide range of usage control …
distributed usage control. OSL supports the formalization of a wide range of usage control …
Declarative language for specifying a security policy
LFP Valente, GH Cooper, RA Shaw… - US Patent …, 2004 - Google Patents
2. Description of the Prior Art Security administrators need tools that help them formu late
their Site Security policy and translate it into monitoring and enforcement mechanisms. They …
their Site Security policy and translate it into monitoring and enforcement mechanisms. They …
Usage control: A vision for next generation access control
The term usage control (UCON) is a generalization of access control to cover obligations,
conditions, continuity (ongoing controls) and mutability. Traditionally, access control has …
conditions, continuity (ongoing controls) and mutability. Traditionally, access control has …
Provisions and obligations in policy management and security applications
Publisher Summary This chapter illustrates that policy management, in a complex system,
calls for more dynamic mechanisms like provisions and obligations. Policies are widely used …
calls for more dynamic mechanisms like provisions and obligations. Policies are widely used …
Towards reasonability properties for access-control policy languages
MC Tschantz, S Krishnamurthi - … of the eleventh ACM symposium on …, 2006 - dl.acm.org
The growing importance of access control has led to the definition of numerous languages
for specifying policies. Since these languages are based on different foundations, language …
for specifying policies. Since these languages are based on different foundations, language …
Distributed policy model for access control
G Friedel, A Katz, Y Shamir, A Nathan - US Patent 7,013,332, 2006 - Google Patents
This invention relates generally to controlling access to resources Such as the Internet, and
more specifically to a distributed policy model for controlling Such access. The networking of …
more specifically to a distributed policy model for controlling Such access. The networking of …
The Policy Machine: A novel architecture and framework for access control policy specification and enforcement
D Ferraiolo, V Atluri, S Gavrila - Journal of Systems Architecture, 2011 - Elsevier
The ability to control access to sensitive data in accordance with policy is perhaps the most
fundamental security requirement. Despite over four decades of security research, the …
fundamental security requirement. Despite over four decades of security research, the …