[HTML][HTML] A comprehensive review of usage control frameworks
I Akaichi, S Kirrane - Computer Science Review, 2025 - Elsevier
The sharing of data and digital assets in a decentralized settling is entangled with various
legislative challenges, including, but not limited to, the need to adhere to legal requirements …
legislative challenges, including, but not limited to, the need to adhere to legal requirements …
Usage control specification, enforcement, and robustness: A survey
I Akaichi, S Kirrane - arxiv preprint arxiv:2203.04800, 2022 - arxiv.org
The management of data and digital assets poses various challenges, including the need to
adhere to legal requirements with respect to personal data protection and copyright. Usage …
adhere to legal requirements with respect to personal data protection and copyright. Usage …
Policy Patterns for Usage Control in Data Spaces
Data-driven technologies have the potential to initiate a transportation related revolution in
the way we travel, commute and navigate within cities. As a major effort of this transformation …
the way we travel, commute and navigate within cities. As a major effort of this transformation …
A Resilient Authorization Evaluation for Cloud Computing
The business-driven access control used in cloud computing is not well suited for tracking
fine-grained user service consumption. UCON ABC applies continuous authorization …
fine-grained user service consumption. UCON ABC applies continuous authorization …
Leveraging smart environments for runtime resources management
Smart environments (SE) have gained widespread attention due to their flexible integration
into everyday life. Applications leveraging the smart environments rely on regular exchange …
into everyday life. Applications leveraging the smart environments rely on regular exchange …
Usage control in SIP-based multimedia delivery
Abstract The Session Initiation Protocol (SIP) is an application layer signaling protocol for
the creation, modification and termination of multimedia sessions and VoIP calls with one or …
the creation, modification and termination of multimedia sessions and VoIP calls with one or …
An efficient technique to access cryptographic file system over network file system
Mounting of cryptographic file system (CFS) over network file system (NFS) degrades the
performance of remote file access. User-space CFS when implemented as modified NFS …
performance of remote file access. User-space CFS when implemented as modified NFS …
Distributed goal-oriented computing
For current computing frameworks, the ability to dynamically use the resources that are
allocated in the network has become a key success factor. As long as the size of the network …
allocated in the network has become a key success factor. As long as the size of the network …
[PDF][PDF] An Investigation into Access Control in Various Types of Operating Systems
MA Ismail, MB Senousy - International Journal of Computer Applications, 2014 - Citeseer
Access control is a security aspect whose importancy increases with technology advances
as it forms the core of any security system. Access control can be applied at the operating …
as it forms the core of any security system. Access control can be applied at the operating …
Applying Digital Rights Management to Corporate Information Systems
Z Su - 2012 - theses.hal.science
To fit the globalised economical environment, enterprises, and mostly SMEs, have to
develop new networked and collaborative strategies, focusing on networked value creation …
develop new networked and collaborative strategies, focusing on networked value creation …