Usage control governs the handling of sensitive data after it has been given away. The enforcement of usage control requirements is a challenge because the service requester in general has no control over the service provider's information processing devices. We analyze applicable trust models, conclude that observation-based enforcement is often more appropriate than enforcement by direct control over the service provider's actions, and present a logical architecture that blends both forms of enforcement with the business logics of serviceoriented architectures. © Springer-Verlag Berlin Heidelberg 2007.
CITATION STYLE
Pretschner, A., Massacci, F., & Hilty, M. (2007). Usage control in service-oriented architectures. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4657 LNCS, pp. 83–93). Springer Verlag. https://doi.org/10.1007/978-3-540-74409-2_11
Mendeley helps you to discover research relevant for your work.