ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Data-centric multi-layer usage control enforcement
Proceedings of the 16th ACM symposium on Access control models and technologies - SACMAT '11
◽
10.1145/1998441.1998467
◽
2011
◽
Cited By ~ 5
Author(s):
Enrico Lovat
◽
Alexander Pretschner
Keyword(s):
Usage Control
Download Full-text
Related Documents
Cited By
References
A Dynamic Secure Access Mechanism for Wireless Sensor Networks Using Usage Control and Agent Technology
IEICE Transactions on Communications
◽
10.1587/transcom.e94.b.1577
◽
2011
◽
Vol E94.B
(6)
◽
pp. 1577-1586
Author(s):
Jun WU
◽
Shigeru SHIMAMOTO
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Wireless Sensor
◽
Agent Technology
◽
Usage Control
◽
Secure Access
Download Full-text
Transfer acceleration of content usage control information by using Base-Values Reference Method
2011 IEEE International Conference on Consumer Electronics (ICCE)
◽
10.1109/icce.2011.5722629
◽
2011
◽
Author(s):
Toshiyuki Masue
◽
Tatsuya Hirai
◽
Takeshi Shikama
Keyword(s):
Reference Method
◽
Usage Control
◽
Control Information
Download Full-text
Continuous Development and Testing of Access and Usage Control
Proceedings of the 2020 European Symposium on Software Engineering
◽
10.1145/3393822.3432330
◽
2020
◽
Author(s):
Said Daoudagh
◽
Francesca Lonetti
◽
Eda Marchetti
Keyword(s):
Continuous Development
◽
Usage Control
Download Full-text
Towards purpose enforcement model for privacy-aware usage control policy in distributed healthcare
International Journal of Security and Networks
◽
10.1504/ijsn.2013.055943
◽
2013
◽
Vol 8
(2)
◽
pp. 94
◽
Cited By ~ 4
Author(s):
Annanda Thavymony Rath
◽
Jean Noël Colin
Keyword(s):
Control Policy
◽
Usage Control
Download Full-text
Deriving implementation-level policies for usage control enforcement
Proceedings of the second ACM conference on Data and Application Security and Privacy - CODASKY '12
◽
10.1145/2133601.2133612
◽
2012
◽
Cited By ~ 8
Author(s):
Prachi Kumari
◽
Alexander Pretschner
Keyword(s):
Usage Control
◽
Implementation Level
Download Full-text
Specifying Usage Control Model with Object Constraint Language
2010 Fourth International Conference on Network and System Security
◽
10.1109/nss.2010.10
◽
2010
◽
Author(s):
Min Li
◽
Hua Wang
Keyword(s):
Control Model
◽
Object Constraint Language
◽
Usage Control
◽
Constraint Language
Download Full-text
Specifying and verifying usage control models and policies in TLA$$^+$$
International Journal on Software Tools for Technology Transfer
◽
10.1007/s10009-020-00600-0
◽
2021
◽
Author(s):
Christos Grompanopoulos
◽
Antonios Gouglidis
◽
Anastasia Mavridou
Keyword(s):
Usage Control
◽
Control Models
Download Full-text
Formal model and policy specification of usage control
ACM Transactions on Information and System Security
◽
10.1145/1108906.1108908
◽
2005
◽
Vol 8
(4)
◽
pp. 351-387
◽
Cited By ~ 144
Author(s):
Xinwen Zhang
◽
Francesco Parisi-Presicce
◽
Ravi Sandhu
◽
Jaehong Park
Keyword(s):
Formal Model
◽
Usage Control
◽
Policy Specification
Download Full-text
"I hereby leave my email to...": Data Usage Control and the Digital Estate
2013 IEEE Security and Privacy Workshops
◽
10.1109/spw.2013.28
◽
2013
◽
Cited By ~ 5
Author(s):
Stephan Micklitz
◽
Martin Ortlieb
◽
Jessica Staddon
Keyword(s):
Usage Control
◽
Data Usage
Download Full-text
Architecture, Workflows, and Prototype for Stateful Data Usage Control in Cloud
2014 IEEE Security and Privacy Workshops
◽
10.1109/spw.2014.13
◽
2014
◽
Cited By ~ 7
Author(s):
Aliaksandr Lazouski
◽
Gaetano Mancini
◽
Fabio Martinelli
◽
Paolo Mori
Keyword(s):
Usage Control
◽
Data Usage
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close