http://www.cnr.it/ontology/cnr/individuo/prodotto/ID182187
Usage Control in Computer Security: A Survey (Articolo in rivista)
- Type
- Label
- Usage Control in Computer Security: A Survey (Articolo in rivista) (literal)
- Anno
- 2010-01-01T00:00:00+01:00 (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#doi
- 10.1016/j.cosrev.2010.02.002 (literal)
- Alternative label
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#autori
- A. Lazouski; F. MArtinelli; P.Mori (literal)
- Pagina inizio
- Pagina fine
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#url
- http://www.sciencedirect.com/science/article/pii/S1574013710000146 (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#numeroVolume
- Rivista
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#pagineTotali
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#numeroFascicolo
- Note
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#affiliazioni
- Titolo
- Usage Control in Computer Security: A Survey (literal)
- Abstract
- Protecting access to digital resources is one of the fundamental problems recognized in the computer security. It yet remains a challenging problem to work out starting from the design of a system till its implementation. Access control is defined as the ability to permit or deny to access a articular resource (object) to a particular entity (subject). Three most widely used traditional access control models are: Discretionary Access Control (DAC), Mandatory Access Control (MAC), and Role Based Access Control (RBAC). Traditional access control solutions do not respond adequately to
new challenges addressed by modern computer systems. Today highly-distributed, network-connected, heterogeneous and open computing environment requires a fine-grained, flexible, persistent and continuous model for protecting the access and usage of digital resources. This paper surveys the literature on Usage Control (UCON) model proposed by R. Sandhu and J. Park. Usage control is the novel and promising approach for access control in open, distributed, heterogeneous and network-connected computer environments. It encompasses and enhances traditional access control models, Trust Management (TM) and Digital Rights Management (DRM), and its main novelties are mutability of attributes and continuity of access decisions evaluation. (literal)
- Prodotto di
- Autore CNR
- Insieme di parole chiave
Incoming links:
- Prodotto
- Autore CNR di
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#rivistaDi
- Insieme di parole chiave di