A Distributed Usage Control System Based on Trusted Computing

2010 ◽  
Vol 33 (1) ◽  
pp. 93-102 ◽  
Author(s):  
Xiao-Bo CHU ◽  
Yu QIN
Author(s):  
Ricardo Neisse ◽  
Alexander Pretschner ◽  
Valentina Di Giacomo

Usage control policies specify restrictions on the handling of data after access has been granted. The authors present the design and implementation of a framework for enforcing usage control requirements and demonstrate its genericity by instantiating it to two different levels of abstraction, those of the operating system and an enterprise service bus. This framework consists of a policy language, an automatic conversion of policies into enforcement mechanisms, and technology implemented on the grounds of trusted computing technology that makes it possible to detect tampering with the infrastructure. The authors show how this framework can, among other things, be used to enforce separation-of-duty policies. The authors provide a performance analysis.


IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 44506-44518
Author(s):  
Bingfei Ren ◽  
Chuanchang Liu ◽  
Bo Cheng ◽  
Shuangxi Hong ◽  
Jie Guo ◽  
...  

Author(s):  
Nicolas Anciaux ◽  
Luc Bouganim ◽  
Philippe Pucheral

This chapter advocates the convergence between Access Control (AC) models, focusing on the granularity of sharing, and Digital Right Management (DRM) models focusing on conditional authorizations and obligations. The convergence is also expected in terms of control enforcement considering that both AC and DRM models must be equally protected against any form of tampering and piracy. We capitalize on the democratization of powerful secure chip platforms (e.g., smart cards, secure USB dongles) which can be plugged in a variety of client devices (PC, PDA, cell phones, consumer electronics) to design a new architecture of a trusted access and usage control system. The benefits of the proposed architecture are exemplified in two different contexts: a fair DRM scenario and a healthcare scenario.


Author(s):  
W. J. Abramson ◽  
H. W. Estry ◽  
L. F. Allard

LaB6 emitters are becoming increasingly popular as direct replacements for tungsten filaments in the electron guns of modern electron-beam instruments. These emitters offer order of magnitude increases in beam brightness, and, with appropriate care in operation, a corresponding increase in source lifetime. They are, however, an order of magnitude more expensive, and may be easily damaged (by improper vacuum conditions and thermal shock) during saturation/desaturation operations. These operations typically require several minutes of an operator's attention, which becomes tedious and subject to error, particularly since the emitter must be cooled during sample exchanges to minimize damage from random vacuum excursions. We have designed a control system for LaBg emitters which relieves the operator of the necessity for manually controlling the emitter power, minimizes the danger of accidental improper operation, and makes the use of these emitters routine on multi-user instruments.Figure 1 is a block schematic of the main components of the control system, and Figure 2 shows the control box.


Sign in / Sign up

Export Citation Format

Share Document