Usage control enforcement is currently voluntary,due to a number of technical difficulties that cannot be ad-dressed by means of purely cryptographic techniques. So, itis commonly argued that purely technical measures should becomplemented by surveillance activities and sanctions prescribedby law. The effectiveness of such measures can - and should - be formally analyzed through game theoretic techniques. Thispaper introduces a framework that integrates both cryptographictechniques and a market model. We provide a first formal analysisof a simplified instance of the framework; it illustrates theintegrated methodology and its potential applications, and raisessome warnings about the effectiveness of naive approaches. © 2013 IEEE.
CITATION STYLE
Bonatti, P. A., Sauro, L., Faella, M., & Galdi, C. (2013). An integrated formal approach to usage control. In Proceedings - IEEE CS Security and Privacy Workshops, SPW 2013 (pp. 8–12). https://doi.org/10.1109/SPW.2013.23
Mendeley helps you to discover research relevant for your work.