@inproceedings{b30799b9eaff404e8e474f3cb76cc81a,
title = "Usage control in service-oriented architectures",
abstract = "Usage control governs the handling of sensitive data after it has been given away. The enforcement of usage control requirements is a challenge because the service requester in general has no control over the service provider's information processing devices. We analyze applicable trust models, conclude that observation-based enforcement is often more appropriate than enforcement by direct control over the service provider's actions, and present a logical architecture that blends both forms of enforcement with the business logics of serviceoriented architectures. {\textcopyright} Springer-Verlag Berlin Heidelberg 2007.",
author = "A. Pretschner and F. Massacci and M. Hilty",
year = "2007",
doi = "10.1007/978-3-540-74409-2_11",
language = "English",
isbn = "9783540744085",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "83--93",
booktitle = "Trust, Privacy and Security in Digital Business - 4th International Conference, TrustBus 2007, Proceedings",
note = "4th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2007 ; Conference date: 04-09-2007 Through 06-09-2007",
}