The Community for Technology Leaders
2012 IEEE Symposium on Security and Privacy Workshops (2013)
San Francisco, CA, USA USA
May 23, 2013 to May 24, 2013
ISBN: 978-1-4799-0458-7
pp: 8-12
Usage control enforcement is currently voluntary,due to a number of technical difficulties that cannot be ad-dressed by means of purely cryptographic techniques. So, itis commonly argued that purely technical measures should becomplemented by surveillance activities and sanctions prescribedby law. The effectiveness of such measures can - and should - be formally analyzed through game theoretic techniques. Thispaper introduces a framework that integrates both cryptographictechniques and a market model. We provide a first formal analysisof a simplified instance of the framework; it illustrates theintegrated methodology and its potential applications, and raisessome warnings about the effectiveness of naive approaches.
Game theory, Usage control
P. A. Bonatti, L. Sauro, M. Faella, C. Galdi, "An Integrated Formal Approach to Usage Control", 2012 IEEE Symposium on Security and Privacy Workshops, vol. 00, no. , pp. 8-12, 2013, doi:10.1109/SPW.2013.23
431 ms
(Ver 3.3 (11022016))