F. Kelbert and A. Pretschner, Towards a policy enforcement infrastructure for distributed usage control, Proceedings of the 17th ACM symposium on Access Control Models and Technologies, SACMAT '12, pp.119-122
DOI : 10.1145/2295136.2295159

URL : https://www22.in.tum.de/fileadmin/papers/sacmat12.pdf

P. Kumari, A. Pretschner, J. Peschla, and J. Kuhn, Distributed data usage control for web applications, Proceedings of the first ACM conference on Data and application security and privacy, CODASPY '11, p.11
DOI : 10.1145/1943513.1943526

M. Hilty, A. Pretschner, D. Basin, C. Schaefer, and T. Walter, A Policy Language for Distributed Usage Control, Proc. ESORICS, pp.531-546, 2007.
DOI : 10.1007/978-3-540-74835-9_35

A. Pretschner, M. Hilty, D. Basin, C. Schaefer, and T. Walter, Mechanisms for usage control, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, pp.240-245, 2008.
DOI : 10.1145/1368310.1368344

URL : http://www.inf.ethz.ch/personal/basin/pubs/asiaccs08.pdf

A. Pretschner, E. Lovat, and M. Buechler, Representation-Independent Data Usage Control, Proc. 6th Intl. Workshop on Data Privacy Management, 2011.
DOI : 10.1007/978-3-642-28879-1_9

P. Kumari and A. Pretschner, Deriving implementation-level policies for usage control enforcement, Proceedings of the second ACM conference on Data and Application Security and Privacy, CODASKY '12, pp.83-94, 2012.
DOI : 10.1145/2133601.2133612

URL : https://www.researchgate.net/profile/Prachi_Kumari/publication/254007385_Deriving_implementation-level_policies_for_usage_control_enforcement/links/53e4cb120cf25d674e94ec95.pdf

P. Kumari and A. Pretschner, Model-Based Usage Control Policy Derivation, Proc. ESSOS 2013, pp.58-74
DOI : 10.1007/978-3-642-36563-8_5

URL : https://www22.in.tum.de/fileadmin/papers/essos13.pdf

M. Rudolph, R. Schwarz, C. Jung, A. Mauthe, and N. Shirazi, Deliverable 3.2 policy specification methodology, 2014.

L. Fang and K. Lefevre, Privacy wizards for social networking sites, Proceedings of the 19th international conference on World wide web, WWW '10, pp.351-360, 2010.
DOI : 10.1145/1772690.1772727

URL : http://www.eecs.umich.edu/%7Eklefevre/Publications_files/www2010.pdf

T. Wüchner and A. Pretschner, Data Loss Prevention Based on Data-Driven Usage Control, 2012 IEEE 23rd International Symposium on Software Reliability Engineering, pp.151-160, 2012.
DOI : 10.1109/ISSRE.2012.10

L. Su, D. Chadwick, A. Basden, and J. Cunningham, Automated decomposition of access control policies, Proc. POLICY 2005, pp.6-8

A. K. Bandara, E. C. Lupu, J. Moffett, and A. Russo, A goal-based approach to policy refinement, Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004., pp.229-239, 2004.
DOI : 10.1109/POLICY.2004.1309175

URL : http://oro.open.ac.uk/6892/01/01309175.pdf

R. Craven, J. Lobo, E. Lupu, A. Russo, and M. Sloman, Decomposition techniques for policy refinement, 2010 International Conference on Network and Service Management, pp.72-79, 2010.
DOI : 10.1109/CNSM.2010.5691331

URL : http://www.doc.ic.ac.uk/~rac101/papers/cnsm.pdf

Y. B. Udupi, A. Sahai, and S. Singhal, A Classification-Based Approach to Policy Refinement, 2007 10th IFIP/IEEE International Symposium on Integrated Network Management, 2007.
DOI : 10.1109/INM.2007.374713

A. Guerrero, V. A. Villagrá, J. E. López-de-vergara, A. Sánchez-macián, and J. Berrocal, Ontology-Based Policy Refinement Using SWRL Rules for Management Information Definitions in OWL, DSOM, pp.227-232, 2006.
DOI : 10.1007/978-3-540-30504-0_10

M. Harvan and A. Pretschner, State-Based Usage Control Enforcement with Data Flow Tracking using System Call Interposition, 2009 Third International Conference on Network and System Security, pp.373-380, 2009.
DOI : 10.1109/NSS.2009.51

A. Pretschner, M. Buechler, M. Harvan, C. Schaefer, and T. Walter, Usage control enforcement with data flow tracking for x11, Proc. STM 2009, pp.124-137

P. Kumari, F. Kelbert, and A. Pretschner, Data Protection in Heterogeneous Distributed Systems: A Smart Meter Example, DSCI, 2011.

R. Neisse and J. Doerr, Model-based specification and refinement of usage control policies, 2013 Eleventh Annual Conference on Privacy, Security and Trust, pp.169-176
DOI : 10.1109/PST.2013.6596051