Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
Publication date | 1/12/2013 |
---|---|
Host publication | Security and Trust Management |
Editors | Audun Jøsang, Pierangela Samarati, Marinella Petrocchi |
Place of Publication | Berlin |
Publisher | Springer Verlag |
Pages | 81-96 |
Number of pages | 16 |
ISBN (electronic) | 9783642380044 |
ISBN (print) | 9783642380037 |
<mark>Original language</mark> | English |
Event | 8th International Workshop on Security and Trust Management, STM 2012 - Pisa, United Kingdom Duration: 13/09/2012 → 14/09/2012 |
Conference | 8th International Workshop on Security and Trust Management, STM 2012 |
---|---|
Country/Territory | United Kingdom |
City | Pisa |
Period | 13/09/12 → 14/09/12 |
Name | Lecture Notes in Computer Science |
---|---|
Publisher | Springer Verlag |
Volume | 7783 |
ISSN (Print) | 0302-9743 |
ISSN (electronic) | 1611-3349 |
Conference | 8th International Workshop on Security and Trust Management, STM 2012 |
---|---|
Country/Territory | United Kingdom |
City | Pisa |
Period | 13/09/12 → 14/09/12 |
The security related characteristics of entities, the contextual information that describes them and the previous or concurrent usages exercised in the system are the criteria that the Usage CONtrol (UCON) family of models utilizes in the usage decision process. In this paper, a detailed classification of the aforementioned criteria along with a representative usage scenario for each category is presented, unveiling a number of UCON's limitations. In turn, a Use-based Usage CONtrol (UseCON) model is proposed that provides, for the creation of a usage decision, enhanced handling of information regarding context and previous or current usages exercised in the system. The enhanced capabilities of the proposed approach are demonstrated and discussed with the use of detailed application examples.