Usage control in computer security: A survey

A Lazouski, F Martinelli, P Mori - Computer Science Review, 2010 - Elsevier
Protecting access to digital resources is one of the fundamental problems recognized in
computer security. As yet it remains a challenging problem to work out, starting from the …

Formal model and policy specification of usage control

X Zhang, F Parisi-Presicce, R Sandhu… - ACM Transactions on …, 2005 - dl.acm.org
The recent usage control model (UCON) is a foundation for next-generation access control
models with distinguishing properties of decision continuity and attribute mutability. A usage …

Survey of access control models and technologies for cloud computing

F Cai, N Zhu, J He, P Mu, W Li, Y Yu - Cluster Computing, 2019 - Springer
Access control is an important measure for the protection of information and system
resources to prevent illegitimate users from getting access to protected objects and …

[PDF][PDF] 基于属性的访问控制模型

李晓峰, 冯登国, 陈朝武, 房子河 - 通信学报, 2008 - infocomm-journal.com
基于属性的访问控制模型Model for attribute based access control Page 1 2008 年4 月 Journal
on Communications April 2008 第29 卷第4 期 通信学报 Vol.29 No.4 基于属性的访问控制模型 …

Toward a usage-based security framework for collaborative computing systems

X Zhang, M Nakae, MJ Covington… - ACM Transactions on …, 2008 - dl.acm.org
Collaborative systems such as Grids provide efficient and scalable access to distributed
computing capabilities and enable seamless resource sharing between users and platforms …

A logical specification for usage control

X Zhang, J Park, F Parisi-Presicce… - Proceedings of the ninth …, 2004 - dl.acm.org
Recently presented usage control (UCON) has been considered as the next generation
access control model with distinguishing properties of decision continuity and attribute …

Implementing usage control in internet of things: a smart home use case

A La Marra, F Martinelli, P Mori… - 2017 IEEE Trustcom …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) is a paradigm which has become extremely popular, with
applications spanning from ehealth to industrial controls. IoT architectures are distributed …

A general obligation model and continuity: enhanced policy enforcement engine for usage control

B Katt, X Zhang, R Breu, M Hafner… - Proceedings of the 13th …, 2008 - dl.acm.org
The usage control model (UCON) has been proposed to augment traditional access control
models by integrating authorizations, obligations, and conditions and providing the …

A usage-based authorization framework for collaborative computing systems

X Zhang, M Nakae, MJ Covington… - Proceedings of the …, 2006 - dl.acm.org
Collaborative systems such as Grids provide efficient and scalable access to distributed
computing capabilities and enable seamless resource sharing between users and platforms …

[PDF][PDF] Session-dependent Usage Control for Big Data.

G Baldi, Y Diaz-Tellez, T Dimitrakos, F Martinelli… - J. Internet Serv. Inf …, 2020 - jisis.org
Business strategies are increasingly driven by the integrated analysis of huge volumes of
heterogeneous data, coming from different sources such for example social media or …