منابع مشابه
Evaluating usage control deterrents
This paper explores the effectiveness of usage control deterrents. Usage control enables finer-grained control over the usage of objects than do traditional access control models. Deterrent controls are intended to discourage individuals from intentionally violating information security policies or procedures. In this context, an adaptation of usage control is assessed as a proactive means of d...
متن کاملEvaluating the usage of wireless broadband hotspots
This paper will discuss the results obtained from testing and evaluating the performance of public Wireless local Area Network (WLAN) hotspots in real life. A fully detailed analysis of a specially constructed testbed will be given. The construction was based on standard user equipments and provided near reality performance results. The paper will also present an overview of the bandwidth and q...
متن کاملEvaluating Machine Translation in a Usage Scenario
In this document we report on a user-scenario-based evaluation aiming at assessing the performance of machine translation (MT) systems in a real context of use. We describe a sequel of experiments that has been performed to estimate the usefulness of MT and to test if improvements of MT technology lead to better performance in the usage scenario. One goal is to find the best methodology for eva...
متن کاملOriginator Control in Usage Control
Originator Control is an access control policy that requires recipients to gain originator’s approval for redissemination of disseminated digital object. Originator control policies are one of the generic and key concerns of usage control. Usage control is an emerging concept which encompasses traditional access control and digital rights management solutions. However, current commercial Digita...
متن کاملMonitors for Usage Control
Distributed usage control is concerned with controlling how data may or may not be used after it has been given away. One strategy for enforcing usage control requirements is based on monitoring data usage and reacting to policy violations by imposing penalties. We show how to implement monitors for usage control requirements using runtime verification technology.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: South African Computer Journal
سال: 2012
ISSN: 2313-7835,1015-7999
DOI: 10.18489/sacj.v48i1.62