Usage control in computer security: A survey

A Lazouski, F Martinelli, P Mori - Computer Science Review, 2010 - Elsevier
Protecting access to digital resources is one of the fundamental problems recognized in
computer security. As yet it remains a challenging problem to work out, starting from the …

Privacy-aware role-based access control

Q Ni, E Bertino, J Lobo, C Brodie, CM Karat… - ACM Transactions on …, 2010 - dl.acm.org
In this article, we introduce a comprehensive framework supporting a privacy-aware access
control mechanism, that is, a mechanism tailored to enforce access control to data …

Monitoring metric first-order temporal properties

D Basin, F Klaedtke, S Müller, E Zălinescu - Journal of the ACM (JACM), 2015 - dl.acm.org
Runtime monitoring is a general approach to verifying system properties at runtime by
comparing system events against a specification formalizing which event sequences are …

[HTML][HTML] A comprehensive review of usage control frameworks

I Akaichi, S Kirrane - Computer Science Review, 2025 - Elsevier
The sharing of data and digital assets in a decentralized settling is entangled with various
legislative challenges, including, but not limited to, the need to adhere to legal requirements …

Distributed usage control

A Pretschner, M Hilty, D Basin - Communications of the ACM, 2006 - dl.acm.org
Distributed usage control Page 1 44 September 2006/Vol. 49, No. 9 COMMUNICATIONS OF
THE ACM Page 2 COMMUNICATIONS OF THE ACM September 2006/Vol. 49, No. 9 39 …

Towards the development of privacy-aware systems

P Guarda, N Zannone - Information and Software Technology, 2009 - Elsevier
Privacy and data protection are pivotal issues in nowadays society. They concern the right to
prevent the dissemination of sensitive or confidential information of individuals. Many …

Usage control architecture options for data sovereignty in business ecosystems

J Zrenner, FO Möller, C Jung, A Eitel… - Journal of Enterprise …, 2019 - emerald.com
Purpose Current business challenges force companies to exchange critical and sensitive
data. The data provider pays great attention to the usage of their data and wants to control it …

Experiences in the logical specification of the HIPAA and GLBA privacy laws

H DeYoung, D Garg, L Jia, D Kaynar… - Proceedings of the 9th …, 2010 - dl.acm.org
Despite the wide array of frameworks proposed for the formal specification and analysis of
privacy laws, there has been comparatively little work on expressing large fragments of …

Policy auditing over incomplete logs: theory, implementation and applications

D Garg, L Jia, A Datta - Proceedings of the 18th ACM conference on …, 2011 - dl.acm.org
We present the design, implementation and evaluation of an algorithm that checks audit logs
for compliance with privacy and security policies. The algorithm, which we name reduce …

Privacy APIs: Access control techniques to analyze and verify legal privacy policies

MJ May, CA Gunter, I Lee - 19th IEEE Computer Security …, 2006 - ieeexplore.ieee.org
There is a growing interest in establishing rules to regulate the privacy of citizens in the
treatment of sensitive personal data such as medical and financial records. Such rules must …