Search For:

Displaying 1-4 out of 4 total
Usage Control Enforcement: Present and Future
Found in: IEEE Security and Privacy
By Alexander Pretschner, Manuel Hilty, Florian Sch├╝tz, Christian Schaefer, Thomas Walter
Issue Date:July 2008
pp. 44-53
Both personal data and intellectual property must be protected for various reasons. The authors explore the state of the art in usage control, which is about controlling the use of such data after it has been given away, and identify room for improvement.
 
DUKE--Distributed Usage Control Enforcement
Found in: Policies for Distributed Systems and Networks, IEEE International Workshop on
By Manuel Hilty, Alexander Pretschner, Christian Schaefer, Thomas Walter
Issue Date:June 2007
pp. 275
Usage control is concerned with what happens to data once the data have been released to a data consumer who is, in principle, able to use the data in any imaginable way. Considerations relating to privacy, intellectual property, and public security, howev...
   
Usage Control Requirements in Mobile and Ubiquitous Computing Applications
Found in: Systems and Networks Communication, International Conference on
By Manuel Hilty, Alexander Pretschner, Christian Schaefer, Thomas Walter
Issue Date:November 2006
pp. 27
Usage control is concerned with control over data after its release to third parties, and includes requirements such as
 
Distributed usage control
Found in: Communications of the ACM
By Alexander Pretschner, David Basin, Manuel Hilty
Issue Date:September 2006
pp. 39-44
Using a server-side architecture to connect specialized enforcement mechanisms with usage control requirements and policies.
     
 1