[HTML][HTML] A comprehensive review of usage control frameworks

I Akaichi, S Kirrane - Computer Science Review, 2025 - Elsevier
The sharing of data and digital assets in a decentralized settling is entangled with various
legislative challenges, including, but not limited to, the need to adhere to legal requirements …

Usage control specification, enforcement, and robustness: A survey

I Akaichi, S Kirrane - arxiv preprint arxiv:2203.04800, 2022 - arxiv.org
The management of data and digital assets poses various challenges, including the need to
adhere to legal requirements with respect to personal data protection and copyright. Usage …

Policy Patterns for Usage Control in Data Spaces

T Dam, A Krimbacher, S Neumaier - arxiv preprint arxiv:2309.11289, 2023 - arxiv.org
Data-driven technologies have the potential to initiate a transportation related revolution in
the way we travel, commute and navigate within cities. As a major effort of this transformation …

A Resilient Authorization Evaluation for Cloud Computing

AL Marcon, AO Santin, M Stihler… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
The business-driven access control used in cloud computing is not well suited for tracking
fine-grained user service consumption. UCON ABC applies continuous authorization …

Leveraging smart environments for runtime resources management

P Barsocchi, A Calabrò, F Lonetti, E Marchetti… - … Quality: Methods and …, 2018 - Springer
Smart environments (SE) have gained widespread attention due to their flexible integration
into everyday life. Applications leveraging the smart environments rely on regular exchange …

Usage control in SIP-based multimedia delivery

G Karopoulos, P Mori, F Martinelli - Computers & security, 2013 - Elsevier
Abstract The Session Initiation Protocol (SIP) is an application layer signaling protocol for
the creation, modification and termination of multimedia sessions and VoIP calls with one or …

An efficient technique to access cryptographic file system over network file system

U Rawat, S Roy, S Acharya, K Kumar - Innovations in Computational …, 2021 - Springer
Mounting of cryptographic file system (CFS) over network file system (NFS) degrades the
performance of remote file access. User-space CFS when implemented as modified NFS …

Distributed goal-oriented computing

J Palanca, M Navarro, V Julian… - Journal of Systems and …, 2012 - Elsevier
For current computing frameworks, the ability to dynamically use the resources that are
allocated in the network has become a key success factor. As long as the size of the network …

[PDF][PDF] An Investigation into Access Control in Various Types of Operating Systems

MA Ismail, MB Senousy - International Journal of Computer Applications, 2014 - Citeseer
Access control is a security aspect whose importancy increases with technology advances
as it forms the core of any security system. Access control can be applied at the operating …

Applying Digital Rights Management to Corporate Information Systems

Z Su - 2012 - theses.hal.science
To fit the globalised economical environment, enterprises, and mostly SMEs, have to
develop new networked and collaborative strategies, focusing on networked value creation …