Monitors for usage control

M. Hilty, A. Pretschner, D. Basin, C. Schaefer, T. Walter

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

Distributed usage control is concerned with controlling how data may or may not be used after it has been given away. One strategy for enforcing usage control requirements is based on monitoring data usage and reacting to policy violations by imposing penalties. We show how to implement monitors for usage control requirements using runtime verification technology.

Original languageEnglish
Title of host publicationTrust Management
Subtitle of host publicationProceedings of IFIPTM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30- August 2, 2007, New Brunswick, Canada
EditorsSandro Etalle, Stephen Marsh
Pages411-414
Number of pages4
DOIs
StatePublished - 2007
Externally publishedYes

Publication series

NameIFIP International Federation for Information Processing
Volume238
ISSN (Print)1571-5736

Fingerprint

Dive into the research topics of 'Monitors for usage control'. Together they form a unique fingerprint.

Cite this