Formal model and policy specification of usage control

@article{Zhang2005FormalMA,
  title={Formal model and policy specification of usage control},
  author={Xinwen Zhang and Francesco Parisi-Presicce and Raghbir Singh Sandhu and Jaehong Park},
  journal={ACM Trans. Inf. Syst. Secur.},
  year={2005},
  volume={8},
  pages={351-387}
}
The recent usage control model (UCON) is a foundation for next-generation access control models with distinguishing properties of decision continuity and attribute mutability. A usage control decision is determined by combining authorizations, obligations, and conditions, presented as UCONABC core models by Park and Sandhu. Based on these core aspects, we develop a formal model and logical specification of UCON with an extension of Lamport's temporal logic of actions (TLA). The building blocks… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 159 CITATIONS, ESTIMATED 93% COVERAGE

Modelling Fine-Grained Access Control Policies in Grids

  • Journal of Grid Computing
  • 2015
VIEW 7 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Contexts-States-Aware Access Control for Internet of Things

  • 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design ((CSCWD))
  • 2018
VIEW 4 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Application de gestion des droits numériques au système d'information d'entreprise

VIEW 7 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Applying Digital Rights Management to Corporate Information Systems

VIEW 7 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Usage control in cloud systems

  • 2012 International Conference for Internet Technology and Secured Transactions
  • 2012
VIEW 5 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

Cost-effective enforcement of UCONA policies

  • 2011 6th International Conference on Risks and Security of Internet and Systems (CRiSIS)
  • 2011
VIEW 17 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Information flow analysis of UCON

VIEW 4 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

On Usage Control in Data Grids

VIEW 7 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

On the Security of Software Systems and Services

VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2006
2019

CITATION STATISTICS

  • 25 Highly Influenced Citations

  • Averaged 6 Citations per year from 2017 through 2019

References

Publications referenced by this paper.
SHOWING 1-5 OF 5 REFERENCES

The UCONABC usage control model

  • ACM Trans. Inf. Syst. Secur.
  • 2004
VIEW 20 EXCERPTS
HIGHLY INFLUENTIAL

The Chinese Wall security policy

  • Proceedings. 1989 IEEE Symposium on Security and Privacy
  • 1989
VIEW 2 EXCERPTS
HIGHLY INFLUENTIAL

Similar Papers

Loading similar papers…