The Community for Technology Leaders
2013 IEEE Security and Privacy Workshops (2013)
San Francisco, CA, USA USA
May 23, 2013 to May 24, 2013
ISBN: 978-1-4799-0458-7
pp: 8-12
Usage control enforcement is currently voluntary,due to a number of technical difficulties that cannot be ad-dressed by means of purely cryptographic techniques. So, itis commonly argued that purely technical measures should becomplemented by surveillance activities and sanctions prescribedby law. The effectiveness of such measures can - and should - be formally analyzed through game theoretic techniques. Thispaper introduces a framework that integrates both cryptographictechniques and a market model. We provide a first formal analysisof a simplified instance of the framework; it illustrates theintegrated methodology and its potential applications, and raisessome warnings about the effectiveness of naive approaches.
Game theory, Usage control

P. A. Bonatti, L. Sauro, M. Faella and C. Galdi, "An Integrated Formal Approach to Usage Control," 2013 IEEE Security and Privacy Workshops(SPW), San Francisco, CA, USA USA, 2013, pp. 8-12.
88 ms
(Ver 3.3 (11022016))