Home > Research > Publications & Outputs > A use-based approach for enhancing UCON
View graph of relations

A use-based approach for enhancing UCON

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

A use-based approach for enhancing UCON. / Grompanopoulos, Christos; Gouglidis, Antonios; Mavridis, Ioannis.
Security and Trust Management. ed. / Audun Jøsang; Pierangela Samarati; Marinella Petrocchi. Berlin: Springer Verlag, 2013. p. 81-96 (Lecture Notes in Computer Science ; Vol. 7783 ).

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Grompanopoulos, C, Gouglidis, A & Mavridis, I 2013, A use-based approach for enhancing UCON. in A Jøsang, P Samarati & M Petrocchi (eds), Security and Trust Management. Lecture Notes in Computer Science , vol. 7783 , Springer Verlag, Berlin, pp. 81-96, 8th International Workshop on Security and Trust Management, STM 2012, Pisa, United Kingdom, 13/09/12. https://doi.org/10.1007/978-3-642-38004-4_6

APA

Grompanopoulos, C., Gouglidis, A., & Mavridis, I. (2013). A use-based approach for enhancing UCON. In A. Jøsang, P. Samarati, & M. Petrocchi (Eds.), Security and Trust Management (pp. 81-96). (Lecture Notes in Computer Science ; Vol. 7783 ). Springer Verlag. https://doi.org/10.1007/978-3-642-38004-4_6

Vancouver

Grompanopoulos C, Gouglidis A, Mavridis I. A use-based approach for enhancing UCON. In Jøsang A, Samarati P, Petrocchi M, editors, Security and Trust Management. Berlin: Springer Verlag. 2013. p. 81-96. (Lecture Notes in Computer Science ). doi: 10.1007/978-3-642-38004-4_6

Author

Grompanopoulos, Christos ; Gouglidis, Antonios ; Mavridis, Ioannis. / A use-based approach for enhancing UCON. Security and Trust Management. editor / Audun Jøsang ; Pierangela Samarati ; Marinella Petrocchi. Berlin : Springer Verlag, 2013. pp. 81-96 (Lecture Notes in Computer Science ).

Bibtex

@inproceedings{ab425a24a6694628b8578687710d4ea3,
title = "A use-based approach for enhancing UCON",
abstract = "The security related characteristics of entities, the contextual information that describes them and the previous or concurrent usages exercised in the system are the criteria that the Usage CONtrol (UCON) family of models utilizes in the usage decision process. In this paper, a detailed classification of the aforementioned criteria along with a representative usage scenario for each category is presented, unveiling a number of UCON's limitations. In turn, a Use-based Usage CONtrol (UseCON) model is proposed that provides, for the creation of a usage decision, enhanced handling of information regarding context and previous or current usages exercised in the system. The enhanced capabilities of the proposed approach are demonstrated and discussed with the use of detailed application examples.",
keywords = "Access control, UCON, Usage control, UseCON",
author = "Christos Grompanopoulos and Antonios Gouglidis and Ioannis Mavridis",
year = "2013",
month = dec,
day = "1",
doi = "10.1007/978-3-642-38004-4_6",
language = "English",
isbn = "9783642380037",
series = "Lecture Notes in Computer Science ",
publisher = "Springer Verlag",
pages = "81--96",
editor = "Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi",
booktitle = "Security and Trust Management",
note = "8th International Workshop on Security and Trust Management, STM 2012 ; Conference date: 13-09-2012 Through 14-09-2012",

}

RIS

TY - GEN

T1 - A use-based approach for enhancing UCON

AU - Grompanopoulos, Christos

AU - Gouglidis, Antonios

AU - Mavridis, Ioannis

PY - 2013/12/1

Y1 - 2013/12/1

N2 - The security related characteristics of entities, the contextual information that describes them and the previous or concurrent usages exercised in the system are the criteria that the Usage CONtrol (UCON) family of models utilizes in the usage decision process. In this paper, a detailed classification of the aforementioned criteria along with a representative usage scenario for each category is presented, unveiling a number of UCON's limitations. In turn, a Use-based Usage CONtrol (UseCON) model is proposed that provides, for the creation of a usage decision, enhanced handling of information regarding context and previous or current usages exercised in the system. The enhanced capabilities of the proposed approach are demonstrated and discussed with the use of detailed application examples.

AB - The security related characteristics of entities, the contextual information that describes them and the previous or concurrent usages exercised in the system are the criteria that the Usage CONtrol (UCON) family of models utilizes in the usage decision process. In this paper, a detailed classification of the aforementioned criteria along with a representative usage scenario for each category is presented, unveiling a number of UCON's limitations. In turn, a Use-based Usage CONtrol (UseCON) model is proposed that provides, for the creation of a usage decision, enhanced handling of information regarding context and previous or current usages exercised in the system. The enhanced capabilities of the proposed approach are demonstrated and discussed with the use of detailed application examples.

KW - Access control

KW - UCON

KW - Usage control

KW - UseCON

U2 - 10.1007/978-3-642-38004-4_6

DO - 10.1007/978-3-642-38004-4_6

M3 - Conference contribution/Paper

AN - SCOPUS:84893063247

SN - 9783642380037

T3 - Lecture Notes in Computer Science

SP - 81

EP - 96

BT - Security and Trust Management

A2 - Jøsang, Audun

A2 - Samarati, Pierangela

A2 - Petrocchi, Marinella

PB - Springer Verlag

CY - Berlin

T2 - 8th International Workshop on Security and Trust Management, STM 2012

Y2 - 13 September 2012 through 14 September 2012

ER -