Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] A comprehensive review of usage control frameworks
I Akaichi, S Kirrane - Computer Science Review, 2025 - Elsevier
The sharing of data and digital assets in a decentralized settling is entangled with various
legislative challenges, including, but not limited to, the need to adhere to legal requirements …
legislative challenges, including, but not limited to, the need to adhere to legal requirements …
Droidforce: Enforcing complex, data-centric, system-wide policies in android
Smartphones are nowadays used to store and process many kinds of privacy-sensitive data
such as contacts, photos, and e-mails. Sensors provide access to the phone's physical …
such as contacts, photos, and e-mails. Sensors provide access to the phone's physical …
PrivacyInsight: the next generation privacy dashboard
C Bier, K Kühne, J Beyerer - Annual privacy forum, 2016 - Springer
Transparency is an integral part of European data protection. In particular, the right of access
allows the data subject to verify if his personal data is processed in a lawful manner. The …
allows the data subject to verify if his personal data is processed in a lawful manner. The …
Science of design for societal-scale cyber-physical systems: challenges and opportunities
Emerging industrial platforms such as the Internet of Things (IoT), Industrial Internet (II) in the
US and Industrie 4.0 in Europe have tremendously accelerated the development of new …
US and Industrie 4.0 in Europe have tremendously accelerated the development of new …
Data loss prevention based on data-driven usage control
Inadvertent data disclosure by insiders is considered as one of the biggest threats for
corporate information security. Data loss prevention systems typically try to cope with this …
corporate information security. Data loss prevention systems typically try to cope with this …
Usage control specification, enforcement, and robustness: A survey
I Akaichi, S Kirrane - arxiv preprint arxiv:2203.04800, 2022 - arxiv.org
The management of data and digital assets poses various challenges, including the need to
adhere to legal requirements with respect to personal data protection and copyright. Usage …
adhere to legal requirements with respect to personal data protection and copyright. Usage …
Data usage control enforcement in distributed systems
F Kelbert, A Pretschner - Proceedings of the third ACM conference on …, 2013 - dl.acm.org
Distributed usage control is concerned with how data may or may not be used in distributed
system environments after initial access has been granted. If data flows through a distributed …
system environments after initial access has been granted. If data flows through a distributed …
Data usage control for distributed systems
F Kelbert, A Pretschner - ACM Transactions on Privacy and Security …, 2018 - dl.acm.org
Data usage control enables data owners to enforce policies over how their data may be
used after they have been released and accessed. We address distributed aspects of this …
used after they have been released and accessed. We address distributed aspects of this …
A fully decentralized data usage control enforcement infrastructure
F Kelbert, A Pretschner - Applied Cryptography and Network Security: 13th …, 2015 - Springer
Distributed data usage control enables data owners to constrain how their data is used by
remote entities. However, many data usage policies refer to events happening within several …
remote entities. However, many data usage policies refer to events happening within several …
How usage control and provenance tracking get together-a data protection perspective
C Bier - 2013 IEEE Security and Privacy Workshops, 2013 - ieeexplore.ieee.org
These days, sensitive and personal information is used within a wide range of applications.
The exchange of this information is increasingly faster and more and more unpredictable …
The exchange of this information is increasingly faster and more and more unpredictable …