Usage control governs the handling of sensitive data after it has been given away. The enforcement of usage control requirements is a challenge because the service requester in general has no control over the service provider's information processing devices. We analyze applicable trust models, conclude that observation-based enforcement is often more appropriate than enforcement by direct control over the service provider's actions, and present a logical architecture that blends both forms of enforcement with the business logics of serviceoriented architectures. © Springer-Verlag Berlin Heidelberg 2007.

Usage Control in Service-Oriented Architectures

Massacci, Fabio;
2007-01-01

Abstract

Usage control governs the handling of sensitive data after it has been given away. The enforcement of usage control requirements is a challenge because the service requester in general has no control over the service provider's information processing devices. We analyze applicable trust models, conclude that observation-based enforcement is often more appropriate than enforcement by direct control over the service provider's actions, and present a logical architecture that blends both forms of enforcement with the business logics of serviceoriented architectures. © Springer-Verlag Berlin Heidelberg 2007.
2007
Trust, Privacy and Security in Digital Business4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings
Berlin
Springer Berlin / Heidelberg
9783540744085
A., Pretschner; Massacci, Fabio; M., Hilty
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11572/50766
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 14
  • ???jsp.display-item.citation.isi??? 11
  • OpenAlex ND
social impact