This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
2013 IEEE CS Security and Privacy Workshops (SPW2013)
San Francisco, CA USA
May 23-May 24
ISBN: 978-1-4799-0458-7
P. A. Bonatti, Dept. of Electr. Eng. & Inf. Technol., Univ. di Napoli Federico II, Naples, Italy
L. Sauro, Dept. of Electr. Eng. & Inf. Technol., Univ. di Napoli Federico II, Naples, Italy
M. Faella, Dept. of Electr. Eng. & Inf. Technol., Univ. di Napoli Federico II, Naples, Italy
C. Galdi, Dept. of Electr. Eng. & Inf. Technol., Univ. di Napoli Federico II, Naples, Italy
Usage control enforcement is currently voluntary, due to a number of technical difficulties that cannot be addressed by means of purely cryptographic techniques. So, it is commonly argued that purely technical measures should be complemented by surveillance activities and sanctions prescribed by law. The effectiveness of such measures can-and should- be formally analyzed through game theoretic techniques. This paper introduces a framework that integrates both cryptographic techniques and a market model. We provide a first formal analysis of a simplified instance of the framework; it illustrates the integrated methodology and its potential applications, and raises some warnings about the effectiveness of naive approaches.
Index Terms:
Surveillance,Cryptography,Law,Privacy,Games,Inspection,Game theory,Usage control
Citation:
P. A. Bonatti, L. Sauro, M. Faella, C. Galdi, "An Integrated Formal Approach to Usage Control," spw, pp.8-12, 2013 IEEE CS Security and Privacy Workshops (SPW2013), 2013
Usage of this product signifies your acceptance of the Terms of Use.