Monitors for Usage Control

نویسندگان

  • Manuel Hilty
  • Alexander Pretschner
  • David A. Basin
  • Christian Schaefer
  • Thomas Walter
چکیده

Distributed usage control is concerned with controlling how data may or may not be used after it has been given away. One strategy for enforcing usage control requirements is based on monitoring data usage and reacting to policy violations by imposing penalties. We show how to implement monitors for usage control requirements using runtime verification technology.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Electromagnetic Radiofrequency Radiation Emitted from GSM Mobile Phones Decreases the Accuracy of Home Blood Glucose Monitors

Mobile phones are two-way radios that emit electromagnetic radiation in microwave range. As the number of mobile phone users has reached 6 billion, the bioeffects of exposure to mobile phone radiation and mobile phone electromagnetic interference with electronic equipment have received more attention, globally. As self-monitoring of blood glucose can be a beneficial part of diabetes control, ho...

متن کامل

Generating Monitors for Usage Control

Protecting computational resources and digital information against unauthorized access is one of the fundamental security requirements in modern computer systems. Usage control addresses the control of computational resources after access has been granted. Despite its fundamental importance, no systematic methods exist to implement formal usage control specifications. This paper presents a mode...

متن کامل

A virtualized usage control bus system

Usage control is an extension of access control that additionally defines what must and must not happen to data after access has been granted. The process of enforcing usage control requirements on data must take into account all the different representations that the data may assume at different levels of abstraction (e.g. file, window content, network packet). Therefore, multiple data flow tr...

متن کامل

بررسی شدت میدان های مغناطیسی و الکتریکی اطراف رایانه های مورد استفاده و تاثیر آن بر سلامت کاربران

Background and aimsIntensity of Magnetic and Electric fields around visual displayterminals and its association on health effects were studied.Methodsmagnetic and electric fields intensities around 237 VDTs at distances 30¡50¡ 60 cm and different operating conditions (active¸ screen saver¸ shut down) with use of HI-3603 device  according to Svensk standard method were monitored. Resultsmagnetic...

متن کامل

Collaborative Monitors for Embedded System Security

This paper presents a hardware based approach to embedded systems security. Usage of on-chip monitors is proposed for identifying attacks on embedded systems by tracking the operation of the system. Two types of monitors: a processing monitor and thermal monitor are presented with their detailed operation and results. The effectiveness of this security system can be enhanced by correlating info...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007