Usage control requirements in mobile and ubiquitous computing applications

Manuel Hilty, Alexander Pretschner, Christian Schaefer, Thomas Walter

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

11 Scopus citations

Abstract

Usage control is concerned with control over data after its release to third parties, and includes requirements such as "this data must be deleted after 30 days" and "this data may be used for statistical purposes only". With the ultimate goal of respective policy languages that go beyond current technology for DRM of intellectual property, we provide (1) a catalog of requirements that are specific to the domains of mobile and ubiquitous computing applications, and (2) a classification of mobile and ubiquitous computing application scenarios that involve usage control, including a description of different kinds of involved data.

Original languageEnglish
Title of host publicationSecond International Conference on Systems and Networks Communications, ICSNC 2006
DOIs
StatePublished - 2006
Externally publishedYes
Event2nd International Conference on Systems and Networks Communications, ICSNC 2006 - Papeete, French Polynesia
Duration: 28 Oct 20062 Nov 2006

Publication series

NameSecond International Conference on Systems and Networks Communications, ICSNC 2006

Conference

Conference2nd International Conference on Systems and Networks Communications, ICSNC 2006
Country/TerritoryFrench Polynesia
CityPapeete
Period28/10/062/11/06

Keywords

  • Mobile computing
  • Policy languages
  • Requirements
  • Ubiquitous computing
  • Usage control

Fingerprint

Dive into the research topics of 'Usage control requirements in mobile and ubiquitous computing applications'. Together they form a unique fingerprint.

Cite this