[1]
A. Lazouski, F. Martinelli, P. Mori, Usage Control in Computer Security: A survey. (2010).
Google Scholar
[2]
B. Katt, X. Zhang, R. Breu, M. Hafner, J. P. Seifert, A general obligation model and continuity: Enhanced policy enforcement engine for usage control, in: SACMAT. 08: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, ACM, New York, NY, USA, (2008).
DOI: 10.1145/1377836.1377856
Google Scholar
[3]
Claudio Bettini, Sushil Jajodia, X. Sean Wang, Duminda Wijesekera, Obligation Monitoring in Policy Management.
Google Scholar
[4]
M. Hilty, D. Basin, A. Pretschner, On obligations, in: Proceedings of ESORICS (2005).
Google Scholar
[5]
J. Park, Usage control: A unified framework for next generation access control, Ph.D. Thesis, George Mason University, Fairfax, VA, USA, (2003).
Google Scholar
[6]
X. Zhang, Formal model and analysis of usage control, Ph.D. Thesis, George Mason University, Fairfax, VA, USA, (2006).
Google Scholar
[7]
J. Park, R. Sandhu, The UCON ABC usage control model, ACM Trans. Inf. Syst. Secur. 7 (1) (2004) 128. 174.
DOI: 10.1145/984334.984339
Google Scholar
[8]
J. Park, R. Sandhu, Towards usage control models: Beyond traditional access control, in: SACMAT. 02: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, ACM, New York, NY, USA, 2002, p.57. 64.
DOI: 10.1145/507711.507722
Google Scholar
[9]
R. Sandhu, K. Ranganathan, X. Zhang, Secure information sharing enabled by trusted computing and PEI models, in: ASIACCS. 06: Proceedings of ACM Symposium on Information, Computer and Communications Security, ACM, New York, NY, USA, (2006).
DOI: 10.1145/1128817.1128820
Google Scholar
[10]
R.S. Sandhu, J. Park, Usage control: A vision for next generation access control, in: MMMACNS, in: Lecture Notes in Computer Science, (2003).
DOI: 10.1007/978-3-540-45215-7_2
Google Scholar
[11]
J. Park, X. Zhang, R.S. Sandhu, Attribute mutability in usage control, in: DBSec, Kluwer, (2004).
Google Scholar
[12]
W. Yao, K. Moody, J. Bacon, A model of OASIS role based access control and its support for active security, in: SACMAT. 01: Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies, ACM, New York, NY, USA, (2001).
DOI: 10.1145/373256.373294
Google Scholar
[13]
A. Pretschner, M. Hilty, D. Basin, Distributed usage control, Commun. ACM 49 (9) (2006) 39. 44.
DOI: 10.1145/1151030.1151053
Google Scholar
[14]
X. Zhang, F. ParisiPresicce, R. Sandhu, J. Park, Formal model and policy specification of usage control, ACM Trans. Inf. Syst. Secur. 8 (4) (2005) 351. 387.
DOI: 10.1145/1108906.1108908
Google Scholar
[15]
S.D.C. di Vimercati, S. Paraboschi, P. Samarati, Access control: Principles and solutions, Softw. Pract. Exper. 33 (5) (2003) 397. 421.
DOI: 10.1002/spe.513
Google Scholar
[16]
R. Sandhu, Engineering authority and trust in cyberspace: The OMAM and RBAC way, in: In Proceedings of 5th ACM Workshop on Role Based Access Control, ACM, 2000, p.111. 119.
DOI: 10.1145/344287.344309
Google Scholar
[17]
W. Ku, C. H. Chi, Survey on the technological aspects of digital rights management, in: Information Security, 2004, p.391. 403.
DOI: 10.1007/978-3-540-30144-8_33
Google Scholar
[18]
H.L. Jonker, S. Mauw, J.H.S. Verschuren, A.T.S.C. Schoonen, Security aspects of DRM systems, in: 25th Symposium on Information Theory in the Benelux, 2004, p.169. 176.
Google Scholar
[19]
M. Sastry, R. Krishnan, R. Sandhu, A new modeling paradigm for dynamic authorization in multidomain systems, in: communications in Computer and Information Science, vol. 1, Springer, Berlin, Heidelberg, 2007, p.153. 158.
DOI: 10.1007/978-3-540-73986-9_13
Google Scholar
[20]
L. Lamport, The temporal logic of actions, ACM Trans. Program. Lang. Syst. 16 (3) (1994) 872. 923.
DOI: 10.1145/177492.177726
Google Scholar
[21]
W. Shin, S.B. Yoo, Secured web services based on extended usage control, in: PAKDD Workshops, in: Lecture Notes in Computer Science, vol. 4819, Springer, 2007, p.656. 663.
DOI: 10.1007/978-3-540-77018-3_65
Google Scholar
[22]
Z. Zhang, L. Yang, Q. Pei, J. Ma, Research on usage control model with delegation characteristics based on OMAM methodology, in: NPC. 2007: Proceedings of Network and Parallel Computing Workshops, 2007, p.238. 243.
DOI: 10.1109/npc.2007.103
Google Scholar
[23]
P. Gama, P. Ferreira, Obligation policies: An enforcement platform, in: POLICY. 05: Proceedings of the Sixth IEEE International Workshop on Policies for Distributed Systems and Networks, IEEE Computer Society, Washington, DC, USA, 2005, p.203.
DOI: 10.1109/policy.2005.18
Google Scholar