Usage control in computer security: A survey
Protecting access to digital resources is one of the fundamental problems recognized in
computer security. As yet it remains a challenging problem to work out, starting from the …
computer security. As yet it remains a challenging problem to work out, starting from the …
Formal model and policy specification of usage control
The recent usage control model (UCON) is a foundation for next-generation access control
models with distinguishing properties of decision continuity and attribute mutability. A usage …
models with distinguishing properties of decision continuity and attribute mutability. A usage …
Survey of access control models and technologies for cloud computing
F Cai, N Zhu, J He, P Mu, W Li, Y Yu - Cluster Computing, 2019 - Springer
Access control is an important measure for the protection of information and system
resources to prevent illegitimate users from getting access to protected objects and …
resources to prevent illegitimate users from getting access to protected objects and …
[PDF][PDF] 基于属性的访问控制模型
李晓峰, 冯登国, 陈朝武, 房子河 - 通信学报, 2008 - infocomm-journal.com
基于属性的访问控制模型Model for attribute based access control Page 1 2008 年4 月 Journal
on Communications April 2008 第29 卷第4 期 通信学报 Vol.29 No.4 基于属性的访问控制模型 …
on Communications April 2008 第29 卷第4 期 通信学报 Vol.29 No.4 基于属性的访问控制模型 …
Toward a usage-based security framework for collaborative computing systems
X Zhang, M Nakae, MJ Covington… - ACM Transactions on …, 2008 - dl.acm.org
Collaborative systems such as Grids provide efficient and scalable access to distributed
computing capabilities and enable seamless resource sharing between users and platforms …
computing capabilities and enable seamless resource sharing between users and platforms …
A logical specification for usage control
Recently presented usage control (UCON) has been considered as the next generation
access control model with distinguishing properties of decision continuity and attribute …
access control model with distinguishing properties of decision continuity and attribute …
Implementing usage control in internet of things: a smart home use case
Internet of Things (IoT) is a paradigm which has become extremely popular, with
applications spanning from ehealth to industrial controls. IoT architectures are distributed …
applications spanning from ehealth to industrial controls. IoT architectures are distributed …
A general obligation model and continuity: enhanced policy enforcement engine for usage control
The usage control model (UCON) has been proposed to augment traditional access control
models by integrating authorizations, obligations, and conditions and providing the …
models by integrating authorizations, obligations, and conditions and providing the …
A usage-based authorization framework for collaborative computing systems
X Zhang, M Nakae, MJ Covington… - Proceedings of the …, 2006 - dl.acm.org
Collaborative systems such as Grids provide efficient and scalable access to distributed
computing capabilities and enable seamless resource sharing between users and platforms …
computing capabilities and enable seamless resource sharing between users and platforms …
[PDF][PDF] Session-dependent Usage Control for Big Data.
G Baldi, Y Diaz-Tellez, T Dimitrakos, F Martinelli… - J. Internet Serv. Inf …, 2020 - jisis.org
Business strategies are increasingly driven by the integrated analysis of huge volumes of
heterogeneous data, coming from different sources such for example social media or …
heterogeneous data, coming from different sources such for example social media or …