Usage control in service-oriented architectures

A. Pretschner, F. Massacci, M. Hilty

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Abstract

Usage control governs the handling of sensitive data after it has been given away. The enforcement of usage control requirements is a challenge because the service requester in general has no control over the service provider's information processing devices. We analyze applicable trust models, conclude that observation-based enforcement is often more appropriate than enforcement by direct control over the service provider's actions, and present a logical architecture that blends both forms of enforcement with the business logics of serviceoriented architectures. © Springer-Verlag Berlin Heidelberg 2007.
Original languageEnglish
Title of host publicationTrust, Privacy and Security in Digital Business - 4th International Conference, TrustBus 2007, Proceedings
PublisherSpringer Verlag
Pages83-93
ISBN (Print)9783540744085
DOIs
Publication statusPublished - 2007
Externally publishedYes
Event4th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2007 - , Germany
Duration: 4 Sept 20076 Sept 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference4th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2007
Country/TerritoryGermany
Period4/09/076/09/07

Fingerprint

Dive into the research topics of 'Usage control in service-oriented architectures'. Together they form a unique fingerprint.

Cite this