A distributed digital rights management model for secure information-distribution systems, International Journal of Information Security, vol.paper, issue.2, pp.113-128, 2004. ,
DOI : 10.1007/978-3-540-30191-2_42
Rights-carrying and self-enforcing information objects for information distribution systems. Information and Communications Security pp, pp.546-561, 2004. ,
Usage control platformization via trustworthy SELinux, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, pp.245-248, 2008. ,
DOI : 10.1145/1368310.1368345
Behavioral attestation for web services (BA4WS), Proceedings of the 2008 ACM workshop on Secure web services, SWS '08, pp.21-28, 2008. ,
DOI : 10.1145/1456492.1456496
Security policy compliance with violation management, Proceedings of the 2007 ACM workshop on Formal methods in security engineering , FMSE '07, pp.31-40, 2007. ,
DOI : 10.1145/1314436.1314441
Evaluating the usability of usage controls in electronic collaboration, Proceedings of the 4th symposium on Usable privacy and security, SOUPS '08, pp.85-92, 2008. ,
DOI : 10.1145/1408664.1408676
Audit-based compliance control, International Journal of Information Security, vol.13, issue.1, pp.133-151, 2007. ,
DOI : 10.3233/JCS-2005-13107
Securing data accountability in decentralized systems. On the Move to Meaningful Internet Systems, pp.626-635, 2006. ,
Secure web-based retrieval of documents with usage controls, Proceedings of the 2009 ACM symposium on Applied Computing, SAC '09, pp.2062-2069, 2009. ,
DOI : 10.1145/1529282.1529738
A posteriori compliance control, Proceedings of the 12th ACM symposium on Access control models and technologies, pp.11-20, 2007. ,
Enforcing UCON Policies on the Enterprise Service Bus, On the Move to Meaningful Internet Systems, pp.876-893, 2010. ,
DOI : 10.1145/1108906.1108908
Monitors for usage control. Trust Management pp, pp.411-414, 2007. ,
L-UCON: Towards Layered Access Control with UCON, 2009 International Conference on Computational Science and Engineering, pp.823-829, 2009. ,
DOI : 10.1109/CSE.2009.163
A general obligation model and continuity, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.123-132, 2008. ,
DOI : 10.1145/1377836.1377856
Guidelines for performing systematic literature reviews in software engineering, 2007. ,
A practical property-based bootstrap architecture, Proceedings of the 2009 ACM workshop on Scalable trusted computing, STC '09, pp.29-38, 2009. ,
DOI : 10.1145/1655108.1655114
Usage Control, Risk and Trust, Trust, Privacy and Security in Digital Business, pp.1-12, 2010. ,
DOI : 10.1145/1108906.1108908
Distributed data usage control for web applications, Proceedings of the first ACM conference on Data and application security and privacy, CODASPY '11, pp.85-96, 2011. ,
DOI : 10.1145/1943513.1943526
Uclinux, Proceedings of the 2007 ACM workshop on Scalable trusted computing , STC '07, pp.63-70, 2007. ,
DOI : 10.1145/1314354.1314371
Usage control in computer security: A survey, Computer Science Review, vol.4, issue.2, pp.81-99, 2010. ,
DOI : 10.1016/j.cosrev.2010.02.002
Digital rights management for content distribution, Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003, pp.49-58, 2003. ,
Why have public key infrastructures failed so far?, Internet Research, vol.15, issue.5, pp.544-556, 2005. ,
DOI : 10.1007/BFb0055482
Infringo ergo sum, Proceedings of the FSE/SDP workshop on Future of software engineering research, FoSER '10, pp.233-238, 2010. ,
DOI : 10.1145/1882362.1882411
The 'how' and 'why' of persistent information security, Proceedings of the 2006 International Conference on Privacy, Security and Trust Bridge the Gap Between PST Technologies and Business Services, PST '06, pp.1-4, 2006. ,
DOI : 10.1145/1501434.1501500
HUE: A hardware UCON engine for fine-grained continuous usage control, 2008 IEEE International Multitopic Conference, pp.59-64, 2008. ,
DOI : 10.1109/INMIC.2008.4777708
A probabilistic approach to information control, Journal of Internet Technology, vol.11, issue.3, pp.407-416, 2010. ,
usage control model, ACM Transactions on Information and System Security, vol.7, issue.1, pp.128-174, 2004. ,
DOI : 10.1145/984334.984339
Distributed usage control, Communications of the ACM, vol.49, issue.9, pp.39-44, 2006. ,
DOI : 10.1145/1151030.1151053
Usage Control Enforcement: Present and Future, IEEE Security & Privacy Magazine, vol.6, issue.4, pp.44-53, 2008. ,
DOI : 10.1109/MSP.2008.101
Usage control in service-oriented architectures . Trust, Privacy and Security in Digital Business pp, pp.83-93, 2007. ,
Client-side access control enforcement using trusted computing and pei models, Journal of High Speed Networks, vol.15, issue.3, pp.229-245, 2006. ,
A logical specification for usage control, Proceedings of the ninth ACM symposium on Access control models and technologies , SACMAT '04, pp.1-10, 2004. ,
DOI : 10.1145/990036.990038
Security Enforcement Model for Distributed Usage Control, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008), pp.10-18, 2008. ,
DOI : 10.1109/SUTC.2008.79