[HTML][HTML] A comprehensive review of usage control frameworks

I Akaichi, S Kirrane - Computer Science Review, 2025 - Elsevier
The sharing of data and digital assets in a decentralized settling is entangled with various
legislative challenges, including, but not limited to, the need to adhere to legal requirements …

Droidforce: Enforcing complex, data-centric, system-wide policies in android

S Rasthofer, S Arzt, E Lovat… - 2014 Ninth International …, 2014 - ieeexplore.ieee.org
Smartphones are nowadays used to store and process many kinds of privacy-sensitive data
such as contacts, photos, and e-mails. Sensors provide access to the phone's physical …

PrivacyInsight: the next generation privacy dashboard

C Bier, K Kühne, J Beyerer - Annual privacy forum, 2016 - Springer
Transparency is an integral part of European data protection. In particular, the right of access
allows the data subject to verify if his personal data is processed in a lawful manner. The …

Science of design for societal-scale cyber-physical systems: challenges and opportunities

J Sztipanovits, X Koutsoukos, G Karsai… - Cyber-Physical …, 2019 - Taylor & Francis
Emerging industrial platforms such as the Internet of Things (IoT), Industrial Internet (II) in the
US and Industrie 4.0 in Europe have tremendously accelerated the development of new …

Data loss prevention based on data-driven usage control

T Wüchner, A Pretschner - 2012 IEEE 23rd International …, 2012 - ieeexplore.ieee.org
Inadvertent data disclosure by insiders is considered as one of the biggest threats for
corporate information security. Data loss prevention systems typically try to cope with this …

Usage control specification, enforcement, and robustness: A survey

I Akaichi, S Kirrane - arxiv preprint arxiv:2203.04800, 2022 - arxiv.org
The management of data and digital assets poses various challenges, including the need to
adhere to legal requirements with respect to personal data protection and copyright. Usage …

Data usage control enforcement in distributed systems

F Kelbert, A Pretschner - Proceedings of the third ACM conference on …, 2013 - dl.acm.org
Distributed usage control is concerned with how data may or may not be used in distributed
system environments after initial access has been granted. If data flows through a distributed …

Data usage control for distributed systems

F Kelbert, A Pretschner - ACM Transactions on Privacy and Security …, 2018 - dl.acm.org
Data usage control enables data owners to enforce policies over how their data may be
used after they have been released and accessed. We address distributed aspects of this …

A fully decentralized data usage control enforcement infrastructure

F Kelbert, A Pretschner - Applied Cryptography and Network Security: 13th …, 2015 - Springer
Distributed data usage control enables data owners to constrain how their data is used by
remote entities. However, many data usage policies refer to events happening within several …

How usage control and provenance tracking get together-a data protection perspective

C Bier - 2013 IEEE Security and Privacy Workshops, 2013 - ieeexplore.ieee.org
These days, sensitive and personal information is used within a wide range of applications.
The exchange of this information is increasingly faster and more and more unpredictable …