Distributed usage control

A Pretschner, M Hilty, D Basin - Communications of the ACM, 2006 - dl.acm.org
Distributed usage control Page 1 44 September 2006/Vol. 49, No. 9 COMMUNICATIONS OF
THE ACM Page 2 COMMUNICATIONS OF THE ACM September 2006/Vol. 49, No. 9 39 …

Mechanisms for usage control

A Pretschner, M Hilty, D Basin, C Schaefer… - Proceedings of the 2008 …, 2008 - dl.acm.org
Mechanisms for usage control Page 1 Mechanisms for Usage Control A. Pretschner, M. Hilty,
D. Basin Information Security, ETH Zurich, Switzerland {pretscha,hiltym,basin}@inf.ethz.ch C …

Formal model and policy specification of usage control

X Zhang, F Parisi-Presicce, R Sandhu… - ACM Transactions on …, 2005 - dl.acm.org
The recent usage control model (UCON) is a foundation for next-generation access control
models with distinguishing properties of decision continuity and attribute mutability. A usage …

A policy language for distributed usage control

M Hilty, A Pretschner, D Basin, C Schaefer… - … Security–ESORICS 2007 …, 2007 - Springer
Abstract We present the Obligation Specification Language (OSL), a policy language for
distributed usage control. OSL supports the formalization of a wide range of usage control …

Declarative language for specifying a security policy

LFP Valente, GH Cooper, RA Shaw… - US Patent …, 2004 - Google Patents
2. Description of the Prior Art Security administrators need tools that help them formu late
their Site Security policy and translate it into monitoring and enforcement mechanisms. They …

Usage control: A vision for next generation access control

R Sandhu, J Park - … Network Security: Second International Workshop on …, 2003 - Springer
The term usage control (UCON) is a generalization of access control to cover obligations,
conditions, continuity (ongoing controls) and mutability. Traditionally, access control has …

Provisions and obligations in policy management and security applications

C Bettini, S Jajodia, XS Wang, D Wijesekera - VLDB'02: Proceedings of the …, 2002 - Elsevier
Publisher Summary This chapter illustrates that policy management, in a complex system,
calls for more dynamic mechanisms like provisions and obligations. Policies are widely used …

Towards reasonability properties for access-control policy languages

MC Tschantz, S Krishnamurthi - … of the eleventh ACM symposium on …, 2006 - dl.acm.org
The growing importance of access control has led to the definition of numerous languages
for specifying policies. Since these languages are based on different foundations, language …

Distributed policy model for access control

G Friedel, A Katz, Y Shamir, A Nathan - US Patent 7,013,332, 2006 - Google Patents
This invention relates generally to controlling access to resources Such as the Internet, and
more specifically to a distributed policy model for controlling Such access. The networking of …

The Policy Machine: A novel architecture and framework for access control policy specification and enforcement

D Ferraiolo, V Atluri, S Gavrila - Journal of Systems Architecture, 2011 - Elsevier
The ability to control access to sensitive data in accordance with policy is perhaps the most
fundamental security requirement. Despite over four decades of security research, the …