2011
DOI: 10.1007/978-3-642-23300-5_4
|View full text |Cite
|
Sign up to set email alerts
|

Usage Control Enforcement - A Survey

Abstract: Sharing information allows businesses to take advantage of hidden knowledge, improve work processes and cooperation both within and across organisations. Thus there is a need for improved information protection capable of restricting how information is used, as opposed to only accessed. Usage Control has been proposed to achieve this by combining and extending traditional access control, Digital Rights Management and various encryption schemes. Advances in usage control enforcement has received considerable at… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 30 publications
0
4
0
Order By: Relevance
“…It then lets the subject access the service if the reply from decision point component is PERMIT; otherwise, it denies access to the subject. This behaviour is typical to many access control models [7][8][9].…”
Section: Enforcement Pointmentioning
confidence: 82%
“…It then lets the subject access the service if the reply from decision point component is PERMIT; otherwise, it denies access to the subject. This behaviour is typical to many access control models [7][8][9].…”
Section: Enforcement Pointmentioning
confidence: 82%
“…How can the aspects described above be enforced for distributed information? While there are several proposed enforcement models [2] , we focus on the two main strategies of enforcement: proactive and reactive enforcement [2]. That is, whether enforcement should attempt to prevent misuse of information or merely detect it.…”
Section: Usage Controlmentioning
confidence: 99%
“…Since the initial proposition from Park and Sandhu [1], several usage control models have been proposed, with different strategies of enforcement. Some of the models have even been implemented as prototypes and tested for computational overhead [2]. From a researcher's perspective, it seems obvious that usage control would help those that share potentially sensitive information with others.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, sharing and spreading digital rights should be our main concern. Existing digital content/rights sharing has been restricted within the general authorized domain, such as digital family domain [8], [9] or personal entertainment domain, which binds distributive digital licensing and content to equipment and (or) user through redistribution and strict usage control security policy [10], [11]. This practice is to ensure that digital content is legal and authorized within the general authorized domain.…”
Section: Related Workmentioning
confidence: 99%