Monitors for Usage Control
نویسندگان
چکیده
Distributed usage control is concerned with controlling how data may or may not be used after it has been given away. One strategy for enforcing usage control requirements is based on monitoring data usage and reacting to policy violations by imposing penalties. We show how to implement monitors for usage control requirements using runtime verification technology.
منابع مشابه
Electromagnetic Radiofrequency Radiation Emitted from GSM Mobile Phones Decreases the Accuracy of Home Blood Glucose Monitors
Mobile phones are two-way radios that emit electromagnetic radiation in microwave range. As the number of mobile phone users has reached 6 billion, the bioeffects of exposure to mobile phone radiation and mobile phone electromagnetic interference with electronic equipment have received more attention, globally. As self-monitoring of blood glucose can be a beneficial part of diabetes control, ho...
متن کاملGenerating Monitors for Usage Control
Protecting computational resources and digital information against unauthorized access is one of the fundamental security requirements in modern computer systems. Usage control addresses the control of computational resources after access has been granted. Despite its fundamental importance, no systematic methods exist to implement formal usage control specifications. This paper presents a mode...
متن کاملA virtualized usage control bus system
Usage control is an extension of access control that additionally defines what must and must not happen to data after access has been granted. The process of enforcing usage control requirements on data must take into account all the different representations that the data may assume at different levels of abstraction (e.g. file, window content, network packet). Therefore, multiple data flow tr...
متن کاملبررسی شدت میدان های مغناطیسی و الکتریکی اطراف رایانه های مورد استفاده و تاثیر آن بر سلامت کاربران
Background and aimsIntensity of Magnetic and Electric fields around visual displayterminals and its association on health effects were studied.Methodsmagnetic and electric fields intensities around 237 VDTs at distances 30¡50¡ 60 cm and different operating conditions (active¸ screen saver¸ shut down) with use of HI-3603 device according to Svensk standard method were monitored. Resultsmagnetic...
متن کاملCollaborative Monitors for Embedded System Security
This paper presents a hardware based approach to embedded systems security. Usage of on-chip monitors is proposed for identifying attacks on embedded systems by tracking the operation of the system. Two types of monitors: a processing monitor and thermal monitor are presented with their detailed operation and results. The effectiveness of this security system can be enhanced by correlating info...
متن کامل