Usage control in computer security: A survey
Protecting access to digital resources is one of the fundamental problems recognized in
computer security. As yet it remains a challenging problem to work out, starting from the …
computer security. As yet it remains a challenging problem to work out, starting from the …
Privacy-aware role-based access control
In this article, we introduce a comprehensive framework supporting a privacy-aware access
control mechanism, that is, a mechanism tailored to enforce access control to data …
control mechanism, that is, a mechanism tailored to enforce access control to data …
Monitoring metric first-order temporal properties
Runtime monitoring is a general approach to verifying system properties at runtime by
comparing system events against a specification formalizing which event sequences are …
comparing system events against a specification formalizing which event sequences are …
[HTML][HTML] A comprehensive review of usage control frameworks
I Akaichi, S Kirrane - Computer Science Review, 2025 - Elsevier
The sharing of data and digital assets in a decentralized settling is entangled with various
legislative challenges, including, but not limited to, the need to adhere to legal requirements …
legislative challenges, including, but not limited to, the need to adhere to legal requirements …
Distributed usage control
Distributed usage control Page 1 44 September 2006/Vol. 49, No. 9 COMMUNICATIONS OF
THE ACM Page 2 COMMUNICATIONS OF THE ACM September 2006/Vol. 49, No. 9 39 …
THE ACM Page 2 COMMUNICATIONS OF THE ACM September 2006/Vol. 49, No. 9 39 …
Towards the development of privacy-aware systems
Privacy and data protection are pivotal issues in nowadays society. They concern the right to
prevent the dissemination of sensitive or confidential information of individuals. Many …
prevent the dissemination of sensitive or confidential information of individuals. Many …
Usage control architecture options for data sovereignty in business ecosystems
Purpose Current business challenges force companies to exchange critical and sensitive
data. The data provider pays great attention to the usage of their data and wants to control it …
data. The data provider pays great attention to the usage of their data and wants to control it …
Experiences in the logical specification of the HIPAA and GLBA privacy laws
Despite the wide array of frameworks proposed for the formal specification and analysis of
privacy laws, there has been comparatively little work on expressing large fragments of …
privacy laws, there has been comparatively little work on expressing large fragments of …
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs
for compliance with privacy and security policies. The algorithm, which we name reduce …
for compliance with privacy and security policies. The algorithm, which we name reduce …
Privacy APIs: Access control techniques to analyze and verify legal privacy policies
There is a growing interest in establishing rules to regulate the privacy of citizens in the
treatment of sensitive personal data such as medical and financial records. Such rules must …
treatment of sensitive personal data such as medical and financial records. Such rules must …