Emerging Technologies in Knowledge Discovery and Data Mining
DOI: 10.1007/978-3-540-77018-3_65
|View full text |Cite
|
Sign up to set email alerts
|

Secured Web Services Based on Extended Usage Control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…These have gained serious attention and concern because of their potential impacts on security and privacy issues. Because of DRM's potential opportunity for commercial sector; current DRM solutions have been largely driven by commercial entities and are mainly focused on intellectual property rights protection which is based on payment functions [7][8][9]. All these models discussed above have tried to protected information or digital resources in one way or another.…”
Section: Prior Workmentioning
confidence: 99%
“…These have gained serious attention and concern because of their potential impacts on security and privacy issues. Because of DRM's potential opportunity for commercial sector; current DRM solutions have been largely driven by commercial entities and are mainly focused on intellectual property rights protection which is based on payment functions [7][8][9]. All these models discussed above have tried to protected information or digital resources in one way or another.…”
Section: Prior Workmentioning
confidence: 99%
“…Behind this classification, the most recent research concerns with attributes delegation and sharing in multidomain, network-connected computer systems [18][19][20][21]. The basic idea of a delegation is that a subject could pass some of its own permissions to others who can carry out some accesses on the behalf of the former.…”
Section: Conceptual Modelmentioning
confidence: 99%
“…The term negotiation suggests that multi-step bidirectional communication takes place. Shin and Yoo (2007) extended the usage control (UCON) model by adding a further component, namely delegation, for the effective modeling of delegating access rights in ubiquitous computing.…”
Section: Background On the Usage Control (Ucon)mentioning
confidence: 99%